Introduction
1.
Analyze
1.1.
Search In Memory
1.2.
Bk2bp
1.3.
Percent
1.4.
Report
1.4.1.
Export Bookmarks
1.4.2.
Threadsync
1.4.3.
Strings Stat
1.4.4.
Crash Detection
1.5.
Network
1.5.1.
Taint Pcap
1.5.2.
Network Packet Tools
1.5.3.
Dump Pcap
1.6.
Ossi
1.6.1.
Bin Coverage
1.6.2.
List Created Processes
1.6.3.
Thread Id
1.6.4.
Search
1.6.5.
Trace Coverage
1.7.
Vulnerability Detection
1.7.1.
Detect Use After Free
1.7.2.
Detect Deadlock On Critical Sections
1.7.3.
Detect Buffer Overflow
1.7.4.
Detect Use Of Uninitialized Memory
1.7.5.
Detect Data Race
1.8.
Migration
1.8.1.
Migrate Bookmarks 2.5 To 2.6
1.8.2.
Import Bookmarks
1.9.
Memory
1.9.1.
Symbols Access Memory Range
1.9.2.
Memory Ranges Accessed By A Symbol
Light (default)
Rust
Coal
Navy
Ayu
Reven API examples
Vulnerability detection
Examples in this section attempt to detect some vulnerabilities present in Reven scenarios.