This tool is designed to use Intel's Pin Tool to instrument reverse engineering binaries and count instructions. PinCTF is implemented as a python script wrapping PIN, executing a pin command and reading from PIN's produced inscount.out file. Included in this repo is a script for pulling down Intel's PIN and instructions for building it on Ubuntu 16.04.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A collaborative malware analysis framework with various features for automated analysis tasks.
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
A sandbox for quickly sandboxing known or unknown families of Android Malware
Code to prevent a managed .NET debugger/profiler from working.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
A tool designed to handle archive file data and augment Yara's capabilities.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.