ETeissonniere / EliDecode
The tool to decode obfuscated shellcodes using the unicorn and capstone engine
☆56Updated 8 years ago
Alternatives and similar repositories for EliDecode:
Users that are interested in EliDecode are comparing it to the libraries listed below
- ☆33Updated 9 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- ☆39Updated 3 years ago
- Analysis PE file or Shellcode☆49Updated 8 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆71Updated 8 years ago
- An implementation of a generic unpacker based on Intel PIN☆29Updated 8 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆31Updated 8 years ago
- ☆26Updated 8 years ago
- Imports MSDN documentation into IDA Pro☆51Updated 13 years ago
- Binary Analysis Platform☆73Updated 11 years ago
- HitCon 2015 spartan 0day & exploit☆27Updated 9 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 8 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 8 years ago
- ☆26Updated 10 years ago
- OpenType font file format fuzzer for Windows☆51Updated 11 years ago
- IDA PDB Loader☆47Updated 6 years ago
- IDATACO IDA Pro Plugin☆47Updated 8 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Updated 8 years ago
- ☆34Updated 7 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Updated 9 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 7 years ago
- Collection of tools for the Pin dynamic instrumentation framework☆42Updated 5 years ago
- BinCrowd Plugin for IDA Pro☆42Updated 13 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 13 years ago
- ☆28Updated 7 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago