MrN0body / rsysadd
☆11Updated this week
Related projects: ⓘ
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- Automatic ROP chain generator☆11Updated 9 years ago
- Visualize an ELF's execution☆10Updated 9 years ago
- Library for Dissect and Infect ELF Binaries.☆39Updated 9 years ago
- ☆12Updated this week
- ☆13Updated this week
- Functions and other Code Snippets often found in Offensive Code or Malware☆20Updated 9 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- ☆14Updated 8 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 10 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- Translate regular Assembly into Extended Instructions☆85Updated 11 years ago
- ☆19Updated this week
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 9 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆30Updated 7 years ago
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Updated 6 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆34Updated 9 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 8 years ago
- ☆11Updated this week
- ☆24Updated this week
- ☆12Updated this week
- Memory awesomeness.☆29Updated 9 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆22Updated 9 years ago
- ☆27Updated this week
- ☆24Updated 11 years ago
- The plugin is an integration of Virus Battle API to the well known IDA Disassembler.☆18Updated 9 years ago