Visual Interface heXadecimal dump
☆53Dec 8, 2016Updated 9 years ago
Alternatives and similar repositories for vix
Users that are interested in vix are comparing it to the libraries listed below
Sorting:
- Display bits of a binary file as pixels☆24Apr 25, 2014Updated 11 years ago
- BinView is a prototype for an application for binary data visualization. It can be used for analyzing large binary blocks and/or files, a…☆14Feb 16, 2015Updated 11 years ago
- Collection of scripts for radare2☆27Jan 1, 2019Updated 7 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆251Apr 14, 2019Updated 6 years ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- Public version of PDF X-RAY☆59Apr 9, 2012Updated 13 years ago
- Tracks runtime instruction execution in Linux programs☆36Aug 25, 2013Updated 12 years ago
- Python repository containing parsed standard C library function and argument information☆29Oct 3, 2018Updated 7 years ago
- A simple, incompatible alternative to pkg-config☆18Oct 5, 2024Updated last year
- Visual reverse engineering tool. Veles is better, use it. Don't use this.☆590Jan 19, 2021Updated 5 years ago
- ☆26Jun 23, 2016Updated 9 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Apr 22, 2022Updated 3 years ago
- .Net assembly code depency inspector☆36Dec 10, 2018Updated 7 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆32Apr 19, 2018Updated 7 years ago
- google app information ninja ,crawl google app information☆12Mar 1, 2015Updated 10 years ago
- Ombud (Swedish for proxy) a simple network proxy that takes addr:port commands☆12Mar 9, 2016Updated 9 years ago
- An offensive attack framework for Distributed Layer of Modern Applications☆85Feb 5, 2020Updated 6 years ago
- Parse nmap scan data with Perl (official repo)☆37Jan 26, 2019Updated 7 years ago
- Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container☆32Apr 7, 2018Updated 7 years ago
- Auditing behaviour of Android Apps☆38Feb 7, 2017Updated 9 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- Toy project for static analysis of ELF binaries☆29Jun 24, 2017Updated 8 years ago
- A schema language for JSON documents that allows validation and compilation into various database engines☆40Jan 23, 2025Updated last year
- ☆10Nov 26, 2020Updated 5 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- ☆11Jun 19, 2021Updated 4 years ago
- a social cms based on node.js and mongodb☆30Feb 22, 2012Updated 14 years ago
- Pure Java Llama2 inference with optional multi-GPU CUDA implementation☆13Sep 2, 2023Updated 2 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆32Feb 23, 2020Updated 6 years ago
- JavaScript Engine Exploits in CTF☆39Oct 30, 2018Updated 7 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Sep 29, 2018Updated 7 years ago
- ld-linux code injector☆50Oct 28, 2011Updated 14 years ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- This program will extract the messages from an Outlook Express (5.0 - 6.0) mailbox and convert it either to the standard mbox or the Outl…☆10Dec 8, 2025Updated 2 months ago
- Easy, flexible C unit testing☆11Feb 13, 2016Updated 10 years ago
- Candescent NUI Port for Kinect V2☆12Jul 26, 2015Updated 10 years ago