Thiefyface / Atrophy
x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)
☆9Updated 7 years ago
Alternatives and similar repositories for Atrophy:
Users that are interested in Atrophy are comparing it to the libraries listed below
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- Static analysis tools for x86 assembly☆13Updated 7 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- Cross-Qt compatibility module for IDAPython.☆13Updated 5 years ago
- Fetch and set configuration values from IDAPython scripts☆20Updated 4 years ago
- Dalvik Header Plugin for IDA Pro☆21Updated 12 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆40Updated 11 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 6 years ago
- ☆28Updated 7 years ago
- A library for interacting with Windows process memory☆7Updated 6 years ago
- Shellcode tracer☆15Updated 8 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 7 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆13Updated 8 years ago
- ☆16Updated 7 years ago
- A tiny tool to learn the assembly code☆11Updated 7 years ago
- Collection of IDA Pro plugins I wrote over the years☆23Updated 14 years ago
- ☆17Updated 6 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆13Updated 10 years ago
- IDA recompiler☆31Updated 10 years ago
- Solutions for various crackmes☆20Updated 12 years ago
- ☆11Updated 9 years ago
- Old and probably outdated IDA plugins☆24Updated 7 years ago
- This repository is a clne of the new cuckoo monitor where I added some stuff to get the calling address for every hooked API☆8Updated 8 years ago
- wow64 syscall filter☆13Updated 10 years ago
- ROP Payload Compiler☆11Updated 7 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 5 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Updated 9 years ago
- ☆27Updated 2 years ago