0vercl0k / stuffzLinks
Basically a script thrift shop
☆590Updated 3 years ago
Alternatives and similar repositories for stuffz
Users that are interested in stuffz are comparing it to the libraries listed below
Sorting:
- A set of exploitation/reversing aids for IDA☆422Updated 8 years ago
- Cross Platform Kernel Fuzzer Framework☆453Updated 7 years ago
- Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone☆325Updated 6 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆438Updated 7 years ago
- Pure Python parser and analyzer for IDA Pro database files (.idb).☆484Updated 8 months ago
- Python scripts for reverse engineering.☆186Updated 4 years ago
- windows syscall table from xp ~ 10 rs4☆356Updated 7 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆407Updated 11 years ago
- A patch analysis tool☆363Updated 5 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆288Updated 9 years ago
- Fentanyl is an IDAPython script that makes patching significantly easier☆211Updated 3 years ago
- Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC☆306Updated last year
- Package Binary Code as a Python class using Binary Ninja and Unicorn Engine☆408Updated 3 years ago
- IDA Pro plugin to assist with complex graphs☆322Updated 2 years ago
- Program synthesis based deobfuscation framework for the USENIX 2017 paper "Syntia: Synthesizing the Semantics of Obfuscated Code"☆314Updated 5 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- Hex-Rays Decompiler Enhanced View☆183Updated 7 years ago
- Automatically exported from code.google.com/p/ioctlfuzzer☆171Updated 10 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆343Updated 6 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆310Updated 6 years ago
- IDA Pro script to add some useful runtime info to static analysis☆531Updated 3 years ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆414Updated 6 years ago
- binary patching from Python☆639Updated 2 years ago
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆140Updated 8 years ago
- A reverse engineering framework written in Python.☆503Updated 9 years ago
- writings on anti-reverse engineering.☆290Updated 4 years ago
- gdbida - a visual bridge between a GDB session and IDA Pro's disassembler☆184Updated 7 years ago
- Cross Architecture Shellcode in C☆208Updated 9 years ago
- PEDA-like debugger UI for WinDbg☆206Updated last year
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆264Updated 8 years ago