JavierYuste / radare2-deep-graphLinks
A Cutter plugin to generate radare2 graphs
☆14Updated 5 years ago
Alternatives and similar repositories for radare2-deep-graph
Users that are interested in radare2-deep-graph are comparing it to the libraries listed below
Sorting:
- Reverse engineering challenges☆52Updated 6 years ago
- Exploit Development and Reverse Engineering with GDB Made Easy☆39Updated 6 years ago
- ☆135Updated 6 years ago
- Corewars but within r2☆60Updated last year
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆50Updated 9 months ago
- PoC || GTFO Issues☆70Updated 6 years ago
- Helper scripts to set up OpenJDK 11 and scale Ghidra for 4K on Ubuntu 18.04 / 18.10☆122Updated 8 months ago
- unofficial fork of inetsim - official source at http://www.inetsim.org/ - changes in branch "pimped"☆29Updated 9 years ago
- ☆36Updated 4 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. c.f., http://foremost.sourc…☆52Updated 13 years ago
- Reverse Engineering tools, scripts, and general commentary☆59Updated 6 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆54Updated 9 years ago
- The RHme2 (Riscure Hack me 2) is a low level hardware CTF challenge that comes in the form of an Arduino Nano board. The new edition prov…☆58Updated 8 years ago
- What do we say to JavaScript? Not today! motherfuckingwebsite.com inspired CTF platform.☆50Updated 6 years ago
- ☆63Updated 4 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆94Updated 3 years ago
- ARP Man-in-the-Middle tool☆31Updated last year
- Database of private SSL/SSH keys for embedded devices☆269Updated 2 years ago
- Intro to Assembly Optimization stream repo☆30Updated 4 years ago
- Automatically exported from code.google.com/p/miranda-upnp☆69Updated 8 years ago
- ☆13Updated 5 years ago
- Network based protocol fuzzer☆74Updated 3 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆155Updated 5 years ago
- Interactive tutorial for radare.☆28Updated 5 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 8 months ago
- Random tools, code snippets, etc. No guarantee that any of this stuff works.☆52Updated last year
- A binary analysis framework☆133Updated 5 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆88Updated 4 years ago
- Red Team Resources☆60Updated 7 years ago
- Content related to hardware hacking☆56Updated 6 years ago