Disassembling binaries to neat asm sources.
☆20Feb 5, 2018Updated 8 years ago
Alternatives and similar repositories for okita-poc
Users that are interested in okita-poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LSE recruitment 2016 - Memory Checker☆11Jul 3, 2016Updated 9 years ago
- Shellyzer Gui is a simple desktop application that helps you analyze shellcode (disassemble shellcode) in well view and i will add many f…☆12Jun 23, 2015Updated 10 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- A console for assemble/disassemble code using capstone/keystone☆32May 14, 2018Updated 8 years ago
- Dispar - Cross-platform Disassemling binary Parser☆20Nov 21, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Ditto.☆18Jul 23, 2020Updated 5 years ago
- Lightweight Symbolic Execution Engine☆23Jul 1, 2015Updated 10 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 9 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- This is the new ftrace (https://github.com/elfmaster/ftrace) - Much faster, better resolution but not complete yet! :)☆111Nov 14, 2018Updated 7 years ago
- Little Ida pro gimmick, to use pip from python.☆10Jun 28, 2015Updated 10 years ago
- gnu gcov like tool☆12Jun 18, 2015Updated 10 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- A tiny tool to learn the assembly code☆12Feb 17, 2017Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Oct 11, 2019Updated 6 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Jan 27, 2017Updated 9 years ago
- Windows payload written in C++, gives total control to the infected machine via reverse-TCP sockets from a web application☆17Feb 10, 2017Updated 9 years ago
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Feb 12, 2019Updated 7 years ago
- Heap implementation for some JavaScript VM☆27Apr 8, 2015Updated 11 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- BitPing A Simple Bitcoin Address Changer From Clipboard☆11Jun 28, 2018Updated 7 years ago
- A minimalistic Operating System relying on a basic bootloader and a small kernel capable of loading a given application☆12Jul 11, 2018Updated 7 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 9 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆38May 11, 2020Updated 6 years ago
- A toolset for extending closed-source Linux processes☆10Apr 12, 2016Updated 10 years ago
- A collection of useful functions to write an exploit in OCaml☆17Oct 11, 2014Updated 11 years ago
- A simple Windows x86-32 debugger☆10May 24, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- A C polymorphic and metamorphic engine☆74Jan 24, 2019Updated 7 years ago
- A Qt-based disassembly viewer based on radare2☆76Feb 9, 2018Updated 8 years ago
- Plog - A simple and powerful keylogger !☆11Jun 28, 2018Updated 7 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆17Mar 8, 2018Updated 8 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 16 years ago
- Provides the ability to patch/hook functions imported by a dll or executable☆36May 31, 2010Updated 15 years ago