Search within binary files for a string, hex, or even another binary file
☆99Dec 10, 2021Updated 4 years ago
Alternatives and similar repositories for SearchBin
Users that are interested in SearchBin are comparing it to the libraries listed below
Sorting:
- BinView is a prototype for an application for binary data visualization. It can be used for analyzing large binary blocks and/or files, a…☆14Feb 16, 2015Updated 11 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- ☆79May 13, 2016Updated 9 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- ☆21Jul 15, 2015Updated 10 years ago
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆17Jan 7, 2017Updated 9 years ago
- IDA PRO plugins, scripts and loaders for mbn and sbl bootloader formats☆22Jul 22, 2016Updated 9 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- ☆14Sep 24, 2012Updated 13 years ago
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Apr 5, 2019Updated 6 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Nov 28, 2013Updated 12 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Yet another dynamic routine hooking library for OS X. Uses Mach exception handlers.☆11Feb 7, 2016Updated 10 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Frida module utils, writen in typescript☆16Jan 30, 2024Updated 2 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Tool used for converting Linux Kernel time jiffies, from iptables xt_recent timestamps, to human datetime☆13Feb 16, 2021Updated 5 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 8 months ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆66Nov 7, 2018Updated 7 years ago
- Inject code into a running process☆121Sep 28, 2021Updated 4 years ago
- A bunch of JEB python scripts☆46Jun 23, 2021Updated 4 years ago
- cve-2014-4323 poc☆24Oct 15, 2015Updated 10 years ago
- Source code and sample exploits for the Stripe CTF Winter 2012☆45Mar 19, 2012Updated 13 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- stupid ptrace tricks☆12May 19, 2021Updated 4 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- ☆13Jun 25, 2016Updated 9 years ago
- Simple tool to extract icons from a pe file and other useful information☆13Jun 22, 2018Updated 7 years ago
- Learning a bit of assembly programming☆13Mar 23, 2015Updated 10 years ago
- Security and Privacy Failures in Popular 2FA Apps☆20Oct 5, 2023Updated 2 years ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated last month