Introduction
1.
Analyze
1.1.
Bk2bp
1.2.
Percent
1.3.
Search In Memory
1.4.
Ossi
1.4.1.
Thread Id
1.4.2.
Search
1.4.3.
Trace Coverage
1.4.4.
List Created Processes
1.4.5.
Bin Coverage
1.5.
Vulnerability Detection
1.5.1.
Detect Buffer Overflow
1.5.2.
Detect Deadlock On Critical Sections
1.5.3.
Detect Use Of Uninitialized Memory
1.5.4.
Detect Data Race
1.5.5.
Detect Use After Free
1.6.
Memory
1.6.1.
Symbols Access Memory Range
1.6.2.
Memory Ranges Accessed By A Symbol
1.7.
Migration
1.7.1.
Migrate Bookmarks 2.5 To 2.6
1.7.2.
Import Bookmarks
1.8.
Report
1.8.1.
Crash Detection
1.8.2.
Threadsync
1.8.3.
Strings Stat
1.8.4.
Export Bookmarks
1.9.
Network
1.9.1.
Dump Pcap
1.9.2.
Taint Pcap
1.9.3.
Network Packet Tools
Light (default)
Rust
Coal
Navy
Ayu
REVEN API examples
Vulnerability detection
Examples in this section attempt to detect some vulnerabilities present in REVEN scenarios.