Practice and learning in the world of C RE and exploit analysis
☆33Feb 2, 2018Updated 8 years ago
Alternatives and similar repositories for C-Hacking
Users that are interested in C-Hacking are comparing it to the libraries listed below
Sorting:
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- ☆24Feb 21, 2016Updated 10 years ago
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- Scripting Assembly Language☆12Sep 2, 2015Updated 10 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35May 7, 2015Updated 10 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- A little Keylogger for Windows developed in C++☆20Jan 24, 2016Updated 10 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- Android based APT exploitation framework☆36Jul 20, 2015Updated 10 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- IDAPython plugin for finding Xrefs from a function☆48Jul 14, 2016Updated 9 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57May 1, 2015Updated 10 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- IDATACO IDA Pro Plugin☆46Jun 14, 2016Updated 9 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- Test Suite and exemplary extensions of the "Attacking Browser Extensions" master's thesis☆28May 22, 2016Updated 9 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- python inspect rootkit tool☆33Oct 17, 2013Updated 12 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Dec 11, 2015Updated 10 years ago
- Exploits, Fuzzers, Scripts etc☆35Dec 30, 2025Updated 2 months ago