0xdabbad00 / icebuddhaLinks
Generic binary file parser
☆59Updated 10 years ago
Alternatives and similar repositories for icebuddha
Users that are interested in icebuddha are comparing it to the libraries listed below
Sorting:
- Fuzzing things with afl and python-afl☆59Updated 8 years ago
- ☆17Updated 7 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Updated 8 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- ☆13Updated 7 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago
- ☆15Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 11 years ago
- Statically linked Library detector☆70Updated 10 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- IRMA frontend☆25Updated 8 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- Memory awesomeness.☆29Updated 10 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- Integrity checking script for Apple Thunderbolt to Ethernet adapters, to check for attacks similar to Thunderstrike 2☆26Updated 9 years ago
- Satellite: Measuring The Internet's Stars☆38Updated 4 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- ☆18Updated 8 years ago
- Scalable Binary Data Extraction in Hadoop☆143Updated 10 years ago
- ☆24Updated 9 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago