ScorchSecurity / systorm
NASM Standard Library for shellcode
☆69Updated 8 years ago
Alternatives and similar repositories for systorm
Users that are interested in systorm are comparing it to the libraries listed below
Sorting:
- Full-bin indexation of binary files☆95Updated 6 years ago
- Implementation of the SMM rootkit "The Watcher"☆126Updated 3 years ago
- Slides and very basic examples☆111Updated 8 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 7 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 8 years ago
- SHURIKEN: Exploit throwing framework☆37Updated 9 years ago
- Semantic Binary Code Analysis Framework☆124Updated 9 years ago
- Translate regular Assembly into Extended Instructions☆86Updated 12 years ago
- A place holder for Keystone repo. See https://github.com/keystone-engine/keystone for the real stuff☆67Updated 3 years ago
- ☆49Updated 7 years ago
- kernel exploitation helper class☆77Updated 8 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆163Updated 8 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 9 years ago
- ☆38Updated 9 years ago
- Binary Ninja Function Annotator☆40Updated 6 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 8 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- An open source, multi-architecture ROP compiler written in python☆162Updated 7 years ago
- ☆86Updated 8 years ago
- Diary of a reverse-engineer☆39Updated 7 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 8 years ago
- Memory awesomeness.☆29Updated 10 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆67Updated 7 years ago
- Programmatic disassembly and patching☆68Updated 8 years ago