ETeissonniere / EliDecodeLinks
The tool to decode obfuscated shellcodes using the unicorn and capstone engine
☆55Updated 9 years ago
Alternatives and similar repositories for EliDecode
Users that are interested in EliDecode are comparing it to the libraries listed below
Sorting:
- ☆26Updated 9 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- A fuzz job for ClamAV☆31Updated 9 years ago
- ☆39Updated 4 years ago
- Analysis PE file or Shellcode☆49Updated 9 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆65Updated 10 years ago
- IDA PDB Loader☆47Updated 6 years ago
- ELF header abuse☆48Updated 9 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- kernel exploitation helper class☆77Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Updated 8 years ago
- Imports MSDN documentation into IDA Pro☆51Updated 13 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 6 years ago
- ☆35Updated 9 years ago
- An implementation of a generic unpacker based on Intel PIN☆28Updated 9 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 8 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Updated 8 years ago
- Collection of pin tools☆52Updated 9 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆92Updated 9 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 9 years ago
- ☆45Updated 7 years ago
- black hat Asia 2017 Slides☆22Updated 8 years ago
- A static Internet Explorer Fuzzer.☆50Updated 8 years ago
- OpenType font file format fuzzer for Windows☆52Updated 12 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Updated 8 years ago
- Black Hat 2016 Slides, Paper and Code☆83Updated 8 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Updated 8 years ago