DavidBuchanan314 / unsafe-pythonLinks
A library to assist writing memory-unsafe code in "pure" python, without any imports (i.e. no ctypes etc.)
☆228Updated 7 months ago
Alternatives and similar repositories for unsafe-python
Users that are interested in unsafe-python are comparing it to the libraries listed below
Sorting:
- ☆424Updated 9 months ago
- The first analysis framework for CPU microcode☆398Updated 2 years ago
- A multi-arch assembly REPL and emulator for your command line.☆308Updated 9 months ago
- ☆95Updated last year
- easylkb - Easy Linux Kernel Builder☆354Updated last year
- playing with DDR DRAM bus fault injection☆92Updated 11 months ago
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆122Updated this week
- simple type recognition in decompiled executables☆113Updated last year
- a tool for reinterpreting ELF executables and shared libraries☆330Updated 10 months ago
- XZ backdoor reverse engineering☆98Updated last year
- CVE-2022-32947 walkthough and demo☆185Updated 2 years ago
- 📡🐧 Linux kernel syscall implementation tracker☆223Updated 5 months ago
- A Pythonic Ghidra standard library☆175Updated 4 months ago
- The Decompilation Wiki: info on all things decompilation☆217Updated this week
- 🐉 Export ghidra decompiled code to dwarf sections inside ELF binary☆214Updated last year
- A research decompiler implemented as a Binary Ninja plugin.☆201Updated this week
- Decompilation as a Service. Explore multiple decompilers and compare their output with minimal effort. Upload binary, get decompilation.☆458Updated 3 years ago
- A pure Python cleanroom implementation of libmagic, with instrumented parsing from Kaitai struct and an interactive hex viewer☆367Updated 2 weeks ago
- Hiding messages in x86 programs using semantic duals☆306Updated last week
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated 2 years ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- Binary Type Inference Ghidra Plugin☆166Updated last year
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,365Updated 7 months ago
- The xx file format. Turn your hex dumps into art, then into binary data.☆345Updated 2 years ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- Learn to LibAFL with parking-game puzzles.☆66Updated last week
- 🌐🐧 Browsable Linux kernel syscall tables built with Systrack (https://github.com/mebeim/systrack)☆198Updated 5 months ago
- libLISA: Instruction Discovery and Analysis on x86-64☆116Updated 6 months ago
- ☆128Updated 2 years ago
- High-performance QEMU memory and instruction tracing☆542Updated last year