For code snippets and information
☆41Apr 5, 2019Updated 7 years ago
Alternatives and similar repositories for blog
Users that are interested in blog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hexagon processor module for IDA Pro disassembler☆19Oct 11, 2022Updated 3 years ago
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Jul 6, 2023Updated 2 years ago
- ☆12Jan 30, 2024Updated 2 years ago
- transfer ownership of any FB50 smart lock to yourself (CVE-2019-13143)☆17Aug 7, 2019Updated 6 years ago
- IDA ClassInformer PlugIn☆65Jul 14, 2015Updated 10 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- peda like debugger script for windbg/windbgx and mingw-gdb☆11Dec 31, 2021Updated 4 years ago
- Slides for presentations held at conferences☆48Jan 2, 2023Updated 3 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆67Oct 4, 2022Updated 3 years ago
- Ghidra's development plugins, scripts, contributing. Presentation☆13Aug 10, 2020Updated 5 years ago
- An automated static taint analysis tool for the Lua web framework.☆24Sep 27, 2024Updated last year
- ☆13Apr 27, 2020Updated 5 years ago
- ☆28Jan 17, 2026Updated 3 months ago
- Dice CTF 2022 breach write-up☆15Feb 14, 2022Updated 4 years ago
- PoC code for CVE-2018-9539☆20Nov 11, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆47May 18, 2020Updated 5 years ago
- ☆17Oct 5, 2020Updated 5 years ago
- Various "bit juggling" helpers and functionality☆16Nov 24, 2025Updated 4 months ago
- A Ghidra plugin for locating object file boundaries.☆129Jan 19, 2026Updated 2 months ago
- IDAPro scripts/plugins☆93Feb 26, 2019Updated 7 years ago
- ☆19Dec 19, 2019Updated 6 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Jul 9, 2018Updated 7 years ago
- A Tools To Decompile OpenWRT Lua Bytecode (LUCI)☆33Jul 19, 2017Updated 8 years ago
- Presented hardware reverse engineering workshops since 2019☆63Aug 8, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆15Feb 1, 2020Updated 6 years ago
- ROP database plugin for IDA☆32Jun 5, 2018Updated 7 years ago
- IDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with mult…☆25Aug 2, 2018Updated 7 years ago
- An automated ROP generation work☆12Mar 5, 2025Updated last year
- Python core of avatar²☆569Mar 31, 2025Updated last year
- PoC Exploit for AOSP UserDictionary Content Provider (CVE-2018-9375)☆21Mar 2, 2019Updated 7 years ago
- ☆64Mar 29, 2022Updated 4 years ago
- PoC code for android RCE with multidex and ZIP files☆40Feb 1, 2016Updated 10 years ago
- An opensource API hooking framework☆22Jan 3, 2020Updated 6 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- IoTVulBench is an open-source benchmark dataset for IoT security research, containing firmware-related vulnerabilities and the correspond…☆19Dec 30, 2024Updated last year
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Dec 6, 2025Updated 4 months ago
- MediaTek MD32 processor module for Ghidra.☆16Apr 10, 2024Updated 2 years ago
- taint tracer/analysis pintool☆26Jul 3, 2014Updated 11 years ago
- D-Link DIR-859 - RCE UnAutenticated (CVE-2019–17621)☆48Mar 23, 2020Updated 6 years ago
- Some tee/trustzone helper stuff☆56Sep 29, 2019Updated 6 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago