0xdabbad00 / icebuddhaLinks
Generic binary file parser
☆59Updated 10 years ago
Alternatives and similar repositories for icebuddha
Users that are interested in icebuddha are comparing it to the libraries listed below
Sorting:
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Samples of binary with different formats and architectures. A test suite for your binary analysis tools.☆22Updated 11 years ago
- Fuzzing things with afl and python-afl☆59Updated 9 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- Memory awesomeness.☆29Updated 10 years ago
- ☆24Updated 10 years ago
- Multiple radare2 rpipe scripts☆61Updated 7 years ago
- Small and cheap standalone USB sanitizer☆44Updated 4 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Updated 9 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 7 years ago
- Integrity checking script for Apple Thunderbolt to Ethernet adapters, to check for attacks similar to Thunderstrike 2☆26Updated 10 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- ☆30Updated 10 years ago
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆80Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- Miscellaneous Tools☆38Updated 10 years ago
- ☆17Updated 7 years ago
- ☆200Updated 9 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- An implementation of the hashcat rules engine in javascript☆49Updated 7 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 10 years ago
- A OS X crypto ransomware PoC☆88Updated 10 years ago
- A simple web based tool for working with assembly / disassembly☆89Updated 9 months ago