Introduction
1.
Analyze
1.1.
Search In Memory
1.2.
Percent
1.3.
Bk2bp
1.4.
Ossi
1.4.1.
Bin Coverage
1.4.2.
List Created Processes
1.4.3.
Trace Coverage
1.4.4.
Search
1.4.5.
Thread Id
1.5.
Network
1.5.1.
Taint Pcap
1.5.2.
Dump Pcap
1.5.3.
Network Packet Tools
1.6.
Vulnerability Detection
1.6.1.
Detect Deadlock On Critical Sections
1.6.2.
Detect Data Race
1.6.3.
Detect Use Of Uninitialized Memory
1.6.4.
Detect Buffer Overflow
1.6.5.
Detect Use After Free
1.7.
Migration
1.7.1.
Migrate Bookmarks 2.5 To 2.6
1.7.2.
Import Bookmarks
1.8.
Memory
1.8.1.
Memory Ranges Accessed By A Symbol
1.8.2.
Symbols Access Memory Range
1.9.
Report
1.9.1.
Threadsync
1.9.2.
Export Bookmarks
1.9.3.
Strings Stat
1.9.4.
Crash Detection
Light (default)
Rust
Coal
Navy
Ayu
Reven API examples
Vulnerability detection
Examples in this section attempt to detect some vulnerabilities present in Reven scenarios.