A Python interface to the GNU Binary File Descriptor (BFD) library.
☆122Jan 6, 2017Updated 9 years ago
Alternatives and similar repositories for pybfd
Users that are interested in pybfd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Feb 1, 2026Updated 2 months ago
- Enumerates very, very large directories quickly by directly using kernel syscalls. For POSIX and Windows. WARNING THIS IS OBSOLETE. USE B…☆15Aug 13, 2014Updated 11 years ago
- ☆13Aug 12, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- Yet Another Indent Finder, Almost...☆21Apr 10, 2020Updated 6 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Automatic ROP chain generator☆12Mar 29, 2015Updated 11 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- LD_PRELOAD-able library which runs all spawned processes under Valgrind.☆15Jul 1, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Dynamic security analysis of embedded systems’ firmwares☆83Oct 18, 2016Updated 9 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Oct 27, 2011Updated 14 years ago
- Rootkit☆24Nov 15, 2014Updated 11 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- Pintool to detect Read before Write memory access☆21Mar 20, 2013Updated 13 years ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detours…☆12Apr 2, 2013Updated 13 years ago
- Python binding to poppler-qt4☆29Nov 28, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- radare2 cLEMENCy plugins☆24Nov 5, 2017Updated 8 years ago
- syscall hijacking in 2019☆13Feb 25, 2019Updated 7 years ago
- A few IDAPython scripts to generate class hierarchy diagrams from IDBs☆35Jan 10, 2012Updated 14 years ago
- The Chef symbolic execution platform, based off S2E☆12Nov 1, 2022Updated 3 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆288May 24, 2016Updated 9 years ago
- NTrace -- a function boundary tracing tool for Windows user and kernel mode☆22Nov 1, 2013Updated 12 years ago
- Tool for detecting violations of ordering axioms in STL comparators☆19Mar 30, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Parsing ELF and DWARF in Python☆2,226Mar 12, 2026Updated 3 weeks ago
- Malware analyses and helpful scripts☆30May 26, 2022Updated 3 years ago
- ☆17Mar 2, 2018Updated 8 years ago
- ☆10Sep 29, 2019Updated 6 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆24Apr 10, 2013Updated 12 years ago
- Code coverage analysis tools for the PIN Toolkit☆60Jun 8, 2013Updated 12 years ago
- analyze the content of the pe file on windows, and shell(pack) function for windows drivers.☆11Nov 9, 2018Updated 7 years ago