Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries and ensure a cryptographically secure hash match for code running on your legacy systems. A client tool that downloads relocation data for various PE files. This ensures when extracting data from memory dump…
☆12Jan 10, 2016Updated 10 years ago
Alternatives and similar repositories for Reloc
Users that are interested in Reloc are comparing it to the libraries listed below
Sorting:
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- CTF exploit development and other tools of pwnage☆19May 30, 2019Updated 6 years ago
- Redress Dissassembler is a cross platform binary disassembler written in Java with Capstone bindings☆24Mar 22, 2016Updated 9 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- Shellyzer Gui is a simple desktop application that helps you analyze shellcode (disassemble shellcode) in well view and i will add many f…☆12Jun 23, 2015Updated 10 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Minimal ARM/Thumb linear sweep disassembler similar to objdump☆10Jun 6, 2016Updated 9 years ago
- LSE recruitment 2016 - Memory Checker☆11Jul 3, 2016Updated 9 years ago
- Support UEFI load☆11Oct 1, 2015Updated 10 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Oct 10, 2015Updated 10 years ago
- A toolset for extending closed-source Linux processes☆10Apr 12, 2016Updated 9 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- A simple Windows x86-32 debugger☆10May 24, 2016Updated 9 years ago
- x86-64 kernel in Rust☆33Dec 21, 2016Updated 9 years ago
- libtalloc is a python script for use with GDB that can be used to analyse the "trivial allocator" (talloc)☆17Aug 6, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- USB armory: open source flash-drive-sized computer☆11Dec 8, 2015Updated 10 years ago
- Voodoo Magic for WPF.☆13Jun 7, 2016Updated 9 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago
- UEFI セキュアブートのサンプル UEFI アプリケーションです。☆11Nov 6, 2016Updated 9 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- A PowerShell binding for the Unicorn Engine☆17Dec 27, 2015Updated 10 years ago
- The plugin is an integration of Virus Battle API to the well known IDA Disassembler.☆20May 26, 2015Updated 10 years ago
- F# JSON Converters for Newtonsoft.Json☆18Jun 22, 2022Updated 3 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆24Apr 10, 2013Updated 12 years ago
- officefileinfo is a python script to help analyse the newer Microsoft Office file formats. There are numerous tools for dealing with the …☆16Apr 28, 2016Updated 9 years ago
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆66Nov 7, 2018Updated 7 years ago
- NTrace -- a function boundary tracing tool for Windows user and kernel mode☆22Nov 1, 2013Updated 12 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- zer0m0n driver for cuckoo sandbox☆24Feb 24, 2015Updated 11 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago