memory-corruption-detector
CommunityDetect and verify memory-safety bugs in Windows binaries.
Software Engineering#security#memory#windows#corruption#binary-analysis#taint-analysis#assembly-verification
Authormarcosd4h
Version1.0.0
Installs0
System Documentation
What problem does it solve?
Detects memory corruption vulnerabilities in Windows binaries produced by DeepExtractIDA, including buffer overflows, use-after-free, double-free, and format string bugs, and provides assembly-level verification.
Core Features & Use Cases
- Four detectors: scan_buffer_overflows.py, scan_integer_issues.py, scan_use_after_free.py, scan_format_strings.py to identify vulnerability classes
- Independent verification: verify_findings.py re-reads code and assembly to confirm findings
- Structured outputs: findings are exported in JSON with scoring and metadata for runtime integration
- Workflow integration: leverages decompiled-code extraction and shared helpers for end-to-end analysis
Quick Start
Identify a module DB and run the scanners to surface memory-corruption findings.
Dependency Matrix
Required Modules
None requiredComponents
scripts
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: memory-corruption-detector Download link: https://github.com/marcosd4h/DeepExtractRuntime/archive/main.zip#memory-corruption-detector Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.