BatchDrake / biteye
Display bits of a binary file as pixels
☆23Updated 10 years ago
Alternatives and similar repositories for biteye:
Users that are interested in biteye are comparing it to the libraries listed below
- Visual Interface heXadecimal dump☆52Updated 8 years ago
- Airprobe for frequency hopping GSM channels☆28Updated 10 years ago
- SAVIORBURST☆21Updated 9 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆50Updated 8 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 6 years ago
- SIGSTOPing ELF binaries since 0x7E1☆52Updated 7 months ago
- ☆17Updated 8 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Application for random attack on Green Petya's key☆22Updated 7 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆79Updated 5 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Writeups for various crackmes, CTFs, wargames, etc.☆15Updated 7 years ago
- ☆26Updated 9 years ago
- please use https://github.com/fireeye/vivisect instead☆16Updated 7 months ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- The GSM parser used for GSMmap and SnoopSnitch (SRLabs)☆33Updated 10 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- Some yara rules and tools☆16Updated 11 years ago
- vstruct based dissectors for various file/protocol formats☆15Updated 7 years ago
- Windows Trollware and Persistence Script☆12Updated 9 years ago
- Timing Sidechannel workshop☆29Updated 11 years ago
- Lite version of PDF X-RAY that uses no backend☆36Updated 13 years ago
- An advanced memory forensics framework☆25Updated 10 years ago
- ☆80Updated 7 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Updated 9 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 9 years ago
- a collection of yara rules for binary analysis☆24Updated 7 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- Exploit Reliability Testing System☆34Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago