A powerful static binary rewriting tool
-
Updated
Jan 19, 2026 - C
A powerful static binary rewriting tool
Omnitrace: Application Profiling, Tracing, and Analysis
An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (.tag) files.
binary instrumentation, analysis, and patching framework
Dynamic-Static binary instrumentation framework on top of GDB
Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enabling users to conduct malware analysis.
Reverse engineered API for Microsoft's Time Travel Debugger
A simple example of how to implement an Inline Hook
A dynamic binary instrumentation tool for tracing and analyzing CUDA kernel instructions.
A binary instrumentation tool to analyze load instructions in any off-the-shelf x86(-64) program. Described by Bera et al. in https://arxiv.org/pdf/2406.18786
tool for monitoring x64 MSVC vtable calls
Flopz - Firmware Liberation on Python
Experimental dynamic binary instrumentation
Hooky is a dynamic analysis tool for mobile application security testing and runtime instrumentation.
Source References for Published CVE & Advisory
a tool that shows which lines of code are executing in a binary in realtime
Artifact for the OOPSLA 2026 paper "Debugging Debugging Information Using Dynamic Call Trees"
Synthesizing black boxed library functions via symbolic execution and component based synthesis.
Tools developed as part of the OOPSLA 2026 paper "Debugging Debugging Information Using Dynamic Call Trees"
x86-64 dynamic taint tracking with Intel Pin 3.23
Add a description, image, and links to the binary-instrumentation topic page so that developers can more easily learn about it.
To associate your repository with the binary-instrumentation topic, visit your repo's landing page and select "manage topics."