Introduction
1.
Analyze
1.1.
Search In Memory
1.2.
Bk2bp
1.3.
Percent
1.4.
Ossi
1.4.1.
List Created Processes
1.4.2.
Bin Coverage
1.4.3.
Search
1.4.4.
Trace Coverage
1.4.5.
Thread Id
1.5.
Network
1.5.1.
Dump Pcap
1.5.2.
Taint Pcap
1.5.3.
Network Packet Tools
1.6.
Vulnerability Detection
1.6.1.
Detect Deadlock On Critical Sections
1.6.2.
Detect Buffer Overflow
1.6.3.
Detect Use Of Uninitialized Memory
1.6.4.
Detect Use After Free
1.6.5.
Detect Data Race
1.7.
Report
1.7.1.
Threadsync
1.7.2.
Export Bookmarks
1.7.3.
Crash Detection
1.7.4.
Strings Stat
1.8.
Migration
1.8.1.
Import Bookmarks
1.8.2.
Migrate Bookmarks 2.5 To 2.6
Light (default)
Rust
Coal
Navy
Ayu
REVEN API examples
Vulnerability detection
Examples in this section attempt to detect some vulnerabilities present in REVEN scenarios.