BatchDrake / biteye
Display bits of a binary file as pixels
☆23Updated 10 years ago
Alternatives and similar repositories for biteye:
Users that are interested in biteye are comparing it to the libraries listed below
- Visual Interface heXadecimal dump☆52Updated 8 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆78Updated 5 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆50Updated 8 years ago
- Swiss Army knife for raw bytes manipulation & interception☆55Updated last year
- Lite version of PDF X-RAY that uses no backend☆36Updated 13 years ago
- NMAP Patches and NSE Scripts☆19Updated 11 years ago
- An advanced memory forensics framework☆25Updated 10 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Cryptowall Tooling & Information☆34Updated 8 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆37Updated 7 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 6 years ago
- See here:☆42Updated 12 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Updated 7 years ago
- SIGSTOPing ELF binaries since 0x7E1☆51Updated 5 months ago
- r2yara - Module for Yara using radare2 information☆34Updated last year
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆86Updated 6 years ago
- Memory awesomeness.☆29Updated 9 years ago
- Exploit Reliability Testing System☆34Updated 9 years ago
- SAVIORBURST☆20Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- vstruct based dissectors for various file/protocol formats☆15Updated 7 years ago
- repository with additional materials and source code☆30Updated 8 years ago
- Automated memory forensics analysis☆32Updated 5 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated 10 months ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 5 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Updated 8 years ago