Apress / software-exorcism
Source code for 'Software Exorcism' by Bill Blunden
☆13Updated 8 years ago
Alternatives and similar repositories for software-exorcism:
Users that are interested in software-exorcism are comparing it to the libraries listed below
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Library to support various Hash-based Message Authentication Codes (HMAC)☆10Updated 5 months ago
- A binary analysis tool for linux☆69Updated 4 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Updated 10 years ago
- Dump sections or program entries from a ELF file☆21Updated 9 years ago
- Redress Dissassembler is a cross platform binary disassembler written in Java with Capstone bindings☆24Updated 9 years ago
- A library which makes modification of browsers' behavior easy.☆10Updated 4 years ago
- An advanced memory forensics framework☆25Updated 10 years ago
- ☆16Updated 7 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- A tiny tool to learn the assembly code☆11Updated 8 years ago
- Miscellaneous macros useful for writing x86 asm in nasm or yasm☆7Updated 4 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 7 years ago
- Plugin for IDA Pro to convert assembler to LLVM IR☆15Updated 8 years ago
- Library for cross-platform C generic data functions☆11Updated 6 months ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆15Updated 8 years ago
- A network stack in userspace☆23Updated 7 years ago
- See here:☆42Updated 12 years ago
- The TCP Scanner☆24Updated 2 years ago
- Sample programs demonstrating how to program in C using the Sockets API.☆36Updated 5 months ago
- A graphical multiplatform tool to manipulate and forward TCP connections.☆12Updated 13 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- Code from the book "Designing BSD Rootkits: An Introduction to Kernel Hacking"☆43Updated 8 years ago
- Multi-architecture CPU Emulator☆14Updated 7 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆135Updated 7 years ago
- Secure Coding Validation Suite☆16Updated 5 years ago
- Source code on the 1.44MB 3.5 floppy accompanying the Windows NT File System Internals book.☆16Updated 5 years ago
- A lightweight packet capture application☆12Updated 10 years ago
- Tool support and visualizaton of Assembly Language within Eclipse, and integrated with IDA Pro. Can also be used as a standalone executab…☆14Updated 9 years ago