0xdabbad00 / icebuddhaLinks
Generic binary file parser
☆59Updated 11 years ago
Alternatives and similar repositories for icebuddha
Users that are interested in icebuddha are comparing it to the libraries listed below
Sorting:
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 10 years ago
- ☆25Updated 10 years ago
- Multiple radare2 rpipe scripts☆61Updated 8 years ago
- Fuzzing things with afl and python-afl☆59Updated 9 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 10 years ago
- Memory awesomeness.☆29Updated 10 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- ☆18Updated 8 years ago
- A simple web based tool for working with assembly / disassembly☆89Updated last year
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 9 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- Samples of binary with different formats and architectures. A test suite for your binary analysis tools.☆23Updated 11 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆111Updated 8 years ago
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆80Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- IRMA frontend☆25Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- ☆30Updated 10 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- ☆198Updated 9 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 8 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 9 years ago
- A OS X crypto ransomware PoC☆88Updated 10 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- spectrum monitoring system for GSM providers☆44Updated 9 years ago