PANDA-powered tracing engine for tenet
☆11Apr 7, 2022Updated 3 years ago
Alternatives and similar repositories for tenet_tracer
Users that are interested in tenet_tracer are comparing it to the libraries listed below
Sorting:
- ☆14Jun 25, 2019Updated 6 years ago
- ☆15Mar 13, 2023Updated 2 years ago
- a friendly implementation of nyx ontop of firecracker instead of QEMU. Easier to use & cleaner code☆30Jan 20, 2026Updated last month
- A fork of AFL for fuzzing Windows binaries☆23May 3, 2018Updated 7 years ago
- Re-implementation of Apple's Continuity Protocol☆19Dec 5, 2019Updated 6 years ago
- Rag-bag of utilities and scripts that do strange things with ELF files☆18Nov 25, 2025Updated 3 months ago
- WinDbg workplace settings that I use for debugging☆16Aug 3, 2017Updated 8 years ago
- Retro Game Engine inspired by the SNES-era☆25Sep 15, 2022Updated 3 years ago
- Cumulative cyclomatic complexity calculation for Ghidra☆20Feb 26, 2026Updated last week
- My CTF writeups☆27Jul 22, 2021Updated 4 years ago
- Qiling Advanced Binary Emulation framework☆23Apr 4, 2020Updated 5 years ago
- Abstract library to generate angr states from a debugger state☆61Jul 5, 2020Updated 5 years ago
- Exploit generator for Intel ME 11 buffer overflow☆33Nov 14, 2019Updated 6 years ago
- ☆36Oct 27, 2019Updated 6 years ago
- various CTF writeups☆61Jun 28, 2018Updated 7 years ago
- Slides about HyperDbg☆39Feb 11, 2026Updated 3 weeks ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆203Jul 22, 2020Updated 5 years ago
- Binary patching framework for Linux kernels☆48Jan 23, 2019Updated 7 years ago
- a tiny, wasm-ready virtual machine - stupidly fast☆38Dec 2, 2025Updated 3 months ago
- examples of using radius2 to solve reversing challenges☆36Jan 3, 2025Updated last year
- CTF binary exploit code☆37Apr 7, 2019Updated 6 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Jan 8, 2017Updated 9 years ago
- A python toolkit that I created to help me solve cryptography CTF challenges.☆10Jun 24, 2022Updated 3 years ago
- Target components for kAFL/Nyx Fuzzer☆36Jan 4, 2024Updated 2 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Simple AutoIt crypter.☆11Mar 3, 2017Updated 9 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Script for filtering roms depending on the name pattern☆15Oct 30, 2018Updated 7 years ago
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- Generate GSM authentication triplets (as per 3GPP TS 55.205)☆16Jan 11, 2018Updated 8 years ago
- Code and files specific to the AWS Certified Security - Specialty Exam Prep course☆10Jan 16, 2024Updated 2 years ago
- Python bindings for AsmJit☆12Aug 13, 2012Updated 13 years ago
- TheRomanXpl0it is an italian academic CTF team from Sapienza, University of Rome.☆12Jan 30, 2026Updated last month
- ESP-NOW based remote control setup☆13Aug 26, 2018Updated 7 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- ☆12Nov 21, 2022Updated 3 years ago
- A "custom" layer 4 protocol for raw socket communication on linux. Golang library.☆10Dec 20, 2018Updated 7 years ago
- Interesting papers☆11Jun 22, 2024Updated last year