BioHarmony-Foundation / OpenEcoBuilderView external linksLinks
Building and Simulating Open Ecological Ideas with OpenSource Technology
☆24Jul 9, 2024Updated last year
Alternatives and similar repositories for OpenEcoBuilder
Users that are interested in OpenEcoBuilder are comparing it to the libraries listed below
Sorting:
- [D^3CTF 2022] pwn-d3guard attachment and official writeup (English & Chinese)☆12Mar 9, 2022Updated 3 years ago
- My WIP bin, various interesting open-source work in progress☆11Aug 2, 2021Updated 4 years ago
- Adaption of the r2ghidra-dec product to lift binaries to LLVM IR☆13Apr 14, 2021Updated 4 years ago
- Hackfest Talk - Abusing PHP 7’s OPcache to Spawn Webshells☆10Nov 6, 2016Updated 9 years ago
- ☆15Jan 31, 2026Updated 2 weeks ago
- JavaScript simulation of the classical XY model☆14Sep 12, 2013Updated 12 years ago
- CSCoin Specification and tools☆10Mar 30, 2017Updated 8 years ago
- ☆13Nov 5, 2017Updated 8 years ago
- Remoto: Arduino OPTA IoT Firmware with MQTT☆20Jun 7, 2025Updated 8 months ago
- ☆16May 15, 2025Updated 8 months ago
- An embedded-focused banned.h / strsafe variant intended to assist for Secure Software Development Lifecycle for Embedded Developers☆15Jul 30, 2019Updated 6 years ago
- A fast generative fuzzer for HTTP☆16Nov 29, 2018Updated 7 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Apr 20, 2015Updated 10 years ago
- Some of the competition seen in the CS Games 2017☆19Mar 30, 2017Updated 8 years ago
- Ghidra extension to disassemble NSIS installers☆24Sep 8, 2025Updated 5 months ago
- A Binary Ninja plugin that automatically resolves type information for EFI protocol usage.☆38Jul 25, 2025Updated 6 months ago
- Default query sets for Joern☆27Oct 23, 2021Updated 4 years ago
- ☆32Jun 19, 2024Updated last year
- ICS Security Labs☆38Mar 27, 2021Updated 4 years ago
- A Ghidra processor module for the EFI Byte Code (EBC)☆35Jun 20, 2020Updated 5 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Oct 23, 2019Updated 6 years ago
- Practical Data-Only Attack Generation☆44Jun 7, 2024Updated last year
- ☆51Mar 9, 2022Updated 3 years ago
- A system to record malware using PANDA☆45May 20, 2019Updated 6 years ago
- Binary visualization tool primarily aimed at videogame reverse engineering & research.☆47Aug 5, 2021Updated 4 years ago
- ☆87Jun 5, 2015Updated 10 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Dec 23, 2017Updated 8 years ago
- Docker image for building ghidra RE framework from source☆76Nov 23, 2022Updated 3 years ago
- A Python tool to generate ROP chains☆65Feb 1, 2025Updated last year
- Helper plugin for analyzing UEFI firmware☆89Jun 3, 2024Updated last year
- EFI DXE Emulator and Interactive Debugger☆87Apr 29, 2020Updated 5 years ago
- ☆100Jun 19, 2024Updated last year
- ☆85Jan 31, 2020Updated 6 years ago
- Repo for CSAW CTF 2016 Quals challenges☆74Sep 18, 2016Updated 9 years ago
- A place holder for Keystone repo. See https://github.com/keystone-engine/keystone for the real stuff☆67Apr 8, 2022Updated 3 years ago
- AFL, with scripts to support other architectures.☆97Nov 7, 2018Updated 7 years ago
- ☆136Jan 24, 2019Updated 7 years ago
- NSIS Reversing Suite with IDA Plugins☆112May 15, 2023Updated 2 years ago
- Windows NT ioctl bruteforcer and modular fuzzer☆126Jan 15, 2019Updated 7 years ago