A WinDbg symbol server for all recent versions of CPython.
☆25Jul 18, 2025Updated 7 months ago
Alternatives and similar repositories for PythonSymbols
Users that are interested in PythonSymbols are comparing it to the libraries listed below
Sorting:
- Python Bytecode Obfuscation☆14Aug 21, 2023Updated 2 years ago
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 7 months ago
- A Cython reverse helper with analyzing Ghidra P-Code. For 2024 CTFCON.☆11Aug 16, 2024Updated last year
- A in-the-wild V8 type confusion bug.☆29Aug 8, 2025Updated 6 months ago
- Plugin on Python; Create signatures for rust binaries☆18Dec 8, 2022Updated 3 years ago
- Dark+ Theme☆50May 17, 2024Updated last year
- Docker file templates for GZCTF, including crypto, pwn, web.☆21Aug 10, 2023Updated 2 years ago
- A JADX plugin for interactive code analysis using Large Language Models (LLMs). Provides dynamic code analysis, security assessment, malw…☆28Dec 14, 2024Updated last year
- cracker for the llvm-fla-obfuscator☆24Sep 6, 2016Updated 9 years ago
- ☆57Aug 6, 2024Updated last year
- ☆34Apr 14, 2025Updated 10 months ago
- ☆34Jun 11, 2024Updated last year
- A gdb plugin for linux kernel.☆28Jul 14, 2023Updated 2 years ago
- SCTF 2023 kernel pwn && CVE-2023-3640☆29Jul 17, 2023Updated 2 years ago
- Exploit for Real World CTF 6th RIPTC.☆33Jan 31, 2024Updated 2 years ago
- Challenges and solutions for Maple CTF 2022.☆28Sep 15, 2022Updated 3 years ago
- Automatic use of House of Some & House of Illusion.☆84Sep 9, 2025Updated 5 months ago
- ☆38May 31, 2024Updated last year
- a simple obfuscator for pyc☆33May 24, 2020Updated 5 years ago
- un sensor pour récupérer les informations des prochaines marées☆12Jan 27, 2026Updated last month
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated 11 months ago
- Go fastcall analysis for ida decompiler☆46Jun 25, 2025Updated 8 months ago
- AFL/AFL++ version FishFuzz☆98Mar 11, 2025Updated 11 months ago
- 每天一个技术点☆10Sep 10, 2023Updated 2 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Library for extracting fields from Sigtran TCAP/INAP messages☆11Feb 17, 2026Updated last week
- A Python implementation of the C Python Interpreter☆97Feb 8, 2026Updated 2 weeks ago
- ☆41Jan 26, 2024Updated 2 years ago
- CVE-2021-33766-poc☆11Sep 15, 2021Updated 4 years ago
- ☆13Apr 26, 2022Updated 3 years ago
- Hardening script for Windows (Domain mode or without domain)☆16Sep 18, 2025Updated 5 months ago
- Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes an…☆11Aug 14, 2024Updated last year
- ☆11Apr 24, 2020Updated 5 years ago
- Publicly accessible version of the FiGHT website.☆17Nov 14, 2025Updated 3 months ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- ☆15Nov 12, 2021Updated 4 years ago
- ☆18May 30, 2025Updated 9 months ago
- Cutting-edge research in a practical way☆12Jul 26, 2019Updated 6 years ago