20urc3 / SekiryuLinks
Comprehensive toolkit for Ghidra headless.
☆362Updated 8 months ago
Alternatives and similar repositories for Sekiryu
Users that are interested in Sekiryu are comparing it to the libraries listed below
Sorting:
- An automatic Blind ROP exploitation tool☆205Updated 2 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆146Updated 3 years ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆474Updated 6 months ago
- ☆207Updated last year
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆125Updated 6 months ago
- ASLR bypass without infoleak☆166Updated 4 years ago
- ☆51Updated 3 years ago
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆648Updated 10 months ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆175Updated 5 months ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆280Updated 2 weeks ago
- Research notes☆131Updated last year
- Code Coverage Exploration Plugin for Ghidra☆372Updated last year
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆262Updated last month
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆373Updated 9 months ago
- ROPfuscator is a fine-grained code obfuscation framework for C/C++ programs using ROP (return-oriented programming).☆435Updated last year
- Bootkit sample for firmware attack☆265Updated last year
- Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binaries☆370Updated 2 months ago
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆523Updated 7 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆170Updated last year
- A tool for firmware cartography☆162Updated last month
- Python Command-Line Ghidra Binary Diffing Engine☆725Updated 3 months ago
- A C++ tool to unstrip Rust/Go binaries (ELF and PE)☆400Updated 11 months ago
- A Binary Genetic Traits Lexer Framework☆520Updated 5 months ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆142Updated 3 years ago
- AI-Powered Malware Analysis & Threat Intelligence for Ghidra Transform your static analysis workflow with cutting-edge AI capabilities, c…☆150Updated 4 months ago
- gdb cheat sheet☆25Updated 5 years ago
- FLARE Team's Binary Navigator☆298Updated 3 weeks ago
- Assortment of hashing algorithms used in malware☆387Updated this week
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆320Updated 2 years ago