DennisYurichev / yurichev.com
☆82Updated this week
Related projects: ⓘ
- ☆99Updated this week
- Run basic functions from stripped binaries cross platform☆109Updated 7 years ago
- My little fuzzing framework inspired by grinder☆99Updated 6 years ago
- 60 artisanal compiler crashes☆39Updated 8 years ago
- Just a simple radare2 Jupyter kernel☆112Updated 6 years ago
- This repository contains a docker container dedicated to reverse engineering☆82Updated 5 years ago
- ☆93Updated this week
- Statically linked Library detector☆69Updated 9 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 3 years ago
- ☆97Updated this week
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 8 years ago
- ☆108Updated this week
- NASM Standard Library for shellcode☆69Updated 8 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58Updated 7 years ago
- A place holder for Keystone repo. See https://github.com/keystone-engine/keystone for the real stuff☆67Updated 2 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- Programmer De-anonymization from Binary Executables☆87Updated 6 years ago
- Slides and very basic examples☆111Updated 7 years ago
- Papers on reverse engineering and assembly language programming☆39Updated 3 years ago
- Implementations of program analysis tools with a focus on machine code☆207Updated 9 years ago
- ☆85Updated this week
- Semantic Binary Code Analysis Framework☆123Updated 8 years ago
- Educational virus written in Assembly that infects 32-bit ELF executables on Linux using the data segment infection method☆75Updated 7 years ago
- Synesthesia, implemented as Yices scripts☆89Updated 7 years ago
- A simple web based tool for working with assembly / disassembly☆87Updated 10 months ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆95Updated 7 years ago
- python-based build system used for building XED☆28Updated last week
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- ☆84Updated 7 years ago