Reverse Dependencies of capstone
The following projects have a declared dependency on capstone:
- angr — A multi-architecture binary analysis toolkit, with the ability to perform dynamic symbolic execution and various static analyses on binaries
- arm-jupyter-kernel — Jupyter kernel for ARM Assemble language.
- avatar2 — A Dynamic Multi-Target Orchestration Framework
- badtooth — A memory hacking package for windows games.
- barf — A multiplatform open source Binary Analysis and Reverse engineering Framework
- binary-refinery — A toolkit to transform and refine (mostly) binary data.
- CAPE-parsers — CAPE: Malware Configuration Extraction
- cemu — Cemu is a simple assembly/dissembly/emulation IDE that provides an easy Plug-n-Play environment to start playing with many architectures (currently supports x86-{32,64}, ARM, AARCH64, MIPS, MIPS64, SPARC and PPC).
- chomper — A lightweight emulation framework for emulating iOS executables and libraries.
- deen — Generic data DEcoding/ENcoding application built with PyQt5
- delf — yet another elf dump tool
- dllhook — Hook x86 dll or executable instruction with python script injecting embedded python interpreter.
- donjon-rainbow — Generic Unicorn tracer for side-channels and fault injection
- Dragodis — A universal interface for running scripts under multiple disassemblers.
- dumpscan — Scanning memory dumps for secrets using volatility and yara
- dwarf-debugger — Full featured multi arch/os debugger built on top of PyQt5 and frida
- dyldextractor — Extract Binaries from Apple's Dyld Shared Cache
- fa — Automation tool for locating symbols & structs in binary (primarily IDA focused)
- fishhook — Allows for runtime hooking of static class functions
- gadgetfinder — A tool with interactive shell for finding gadgets in executable files
- gdb-plus — Python library to automate gdb debugging
- heimdall-vmi — Vm introspection
- iasm — Interactive Assembler
- infernum — A lightweight Android native library emulation framework for executing the encryption algorithm.
- kcshell — Simple Python3 based interactive assembly/disassembly shell for various architectures powered by Keystone/Capstone.
- libmemmod — A library to modify another program's memory.
- malduck — Malduck is your ducky companion in malware analysis journeys
- manticore — Manticore is a symbolic execution tool for analysis of binaries and smart contracts.
- one-gadget — A python library to find one-gadget
- patchelfy — Python library to automate gdb debugging
- pe-tree — View Portable Executable (PE) files in a tree-view using pefile and PyQt5.
- pegreet — Library and CLI tool for parsing, validating, modifying, and updating `pyproject.toml` files.
- ppcdis-protobuf — NOTE: this is NOT the upstream ppcdis, this is m8's branch that uses protobuf persistence
- pwnypack — Official Certified Edible Dinosaurs CTF toolkit.
- Pybag — Python wrappers for DbgEng from Windbg
- pykernelpatch — iOS kernelcache patcher
- pypipa — Platform Integrated Performance Analytics, PIPA
- python-idb — Pure Python parser for IDA Pro databases (.idb files)
- pythonasm — A Python library for ASM
- qbindiff — QBindiff binary diffing tool based on a Network Alignment problem
- qiling — Qiling is an advanced binary emulation framework that cross-platform-architecture
- qsynthesis — Python API to synthesize Triton AST's
- quokka-project — Quokka: A Fast and Accurate Binary Exporter
- riscos-disassemble — Disassemble ARM and Thumb files like RISC OS
- ropgadget — This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation.
- ropgenerator — ROPGenerator makes ROP exploits easy by finding and chaining gadgets
- rpcclient — rpcclient for connecting with the rpcserver
- sdfiawejfjawifaj — Extract Binaries from Apple's Dyld Shared Cache
- shellcode — CLI to turn shellcode back to asm.
- shellcrafter — A package containing scripts for developing and generating shellcode
- shooker — Tool for C-code injections in already compiled bins
- sower-androidemu — sower
- speakeasy-emulator — Speakeasy malware emulation framework
- sqlelf — Explore ELF objects through the power of SQL
- strongarm-dataflow — AArch64 dataflow analysis via backward program slicing
- strongarm-ios — Mach-O/ARM64 analyzer
- telfhash — Generates hash for ELF files
- thglib — thg exploit framework and exploit development library.
- ThreatHunter — no summary
- umbrella-py — ObjC and Swift application binary interface (ABI) to inspect static runtime information. (w. Class-Dump)
- unipacker — Automatic and platform-independent unpacker for Windows binaries based on emulation
- uniref — Unity reflection framework
- volatility3 — Memory forensics framework
- YaraForge — A plugin for IDA Pro to generate Yara rules from binary files.
- zelos — A comprehensive binary emulation platform.
1