Introduction
1.
Analyze
1.1.
Percent
1.2.
Search In Memory
1.3.
Bk2bp
1.4.
Migration
1.4.1.
Import Bookmarks
1.4.2.
Migrate Bookmarks 2.5 To 2.6
1.5.
Network
1.5.1.
Dump Pcap
1.5.2.
Network Packet Tools
1.5.3.
Taint Pcap
1.6.
Ossi
1.6.1.
Trace Coverage
1.6.2.
List Created Processes
1.6.3.
Bin Coverage
1.6.4.
Thread Id
1.6.5.
Search
1.7.
Vulnerability Detection
1.7.1.
Detect Use Of Uninitialized Memory
1.7.2.
Detect Use After Free
1.7.3.
Detect Data Race
1.7.4.
Detect Buffer Overflow
1.7.5.
Detect Deadlock On Critical Sections
1.8.
Report
1.8.1.
Export Bookmarks
1.8.2.
Crash Detection
1.8.3.
Strings Stat
1.8.4.
Threadsync
Light (default)
Rust
Coal
Navy
Ayu
REVEN API examples
Vulnerability detection
Examples in this section attempt to detect some vulnerabilities present in REVEN scenarios.