ScorchSecurity / systorm
NASM Standard Library for shellcode
☆69Updated 8 years ago
Alternatives and similar repositories for systorm:
Users that are interested in systorm are comparing it to the libraries listed below
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- Synesthesia, implemented as Yices scripts☆93Updated 7 years ago
- Full-bin indexation of binary files☆95Updated 6 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- ☆38Updated 9 years ago
- A place holder for Keystone repo. See https://github.com/keystone-engine/keystone for the real stuff☆67Updated 2 years ago
- Slides and very basic examples☆111Updated 7 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 8 years ago
- ☆49Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆25Updated 9 years ago
- Binary Ninja Function Annotator☆40Updated 6 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆73Updated 8 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆67Updated 7 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆161Updated 8 years ago
- Implementation of the SMM rootkit "The Watcher"☆124Updated 2 years ago
- Statically linked Library detector☆70Updated 10 years ago
- Diary of a reverse-engineer☆38Updated 7 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆50Updated 8 years ago
- Triton based R2 plugin for concolic execution and total control☆31Updated 6 years ago
- A "general-purpose" tracing tool☆38Updated 9 years ago
- SHURIKEN: Exploit throwing framework☆36Updated 9 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 8 years ago
- Semantic Binary Code Analysis Framework☆125Updated 9 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆162Updated this week
- ☆67Updated 3 years ago
- Small tool for generating ropchains using unicorn and z3☆197Updated 7 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 8 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 9 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago