ScorchSecurity / systormLinks
NASM Standard Library for shellcode
☆69Updated 8 years ago
Alternatives and similar repositories for systorm
Users that are interested in systorm are comparing it to the libraries listed below
Sorting:
- Basic command line, text-based, shellcode debugger.☆91Updated 8 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 8 years ago
- ☆38Updated 9 years ago
- A place holder for Keystone repo. See https://github.com/keystone-engine/keystone for the real stuff☆67Updated 3 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 8 years ago
- SHURIKEN: Exploit throwing framework☆37Updated 9 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- Statically linked Library detector☆70Updated 10 years ago
- ☆49Updated 7 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 9 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 9 years ago
- Stealth's 64bit injectso port☆74Updated 14 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- ARM rop chain gadget searcher☆38Updated 7 years ago
- kernel exploitation helper class☆77Updated 8 years ago
- SIGSTOPing ELF binaries since 0x7E1☆54Updated 11 months ago
- Memory awesomeness.☆29Updated 10 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated 2 months ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆164Updated 8 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 8 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Updated 8 years ago
- ☆72Updated 6 years ago
- Library for creating CTF services.☆74Updated 8 years ago
- Semantic Binary Code Analysis Framework☆124Updated 9 years ago
- Collection of software bugs found by SkyLined☆68Updated 8 years ago