Thiefyface / AtrophyLinks
x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)
☆9Updated 8 years ago
Alternatives and similar repositories for Atrophy
Users that are interested in Atrophy are comparing it to the libraries listed below
Sorting:
- Dalvik Header Plugin for IDA Pro☆22Updated 12 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- Collection of IDA Pro plugins I wrote over the years☆23Updated 15 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- Cross-Qt compatibility module for IDAPython.☆13Updated 5 years ago
- A library for interacting with Windows process memory☆7Updated 6 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 8 years ago
- This repository is a clne of the new cuckoo monitor where I added some stuff to get the calling address for every hooked API☆8Updated 9 years ago
- Shellcode tracer☆15Updated 8 years ago
- wow64 syscall filter☆13Updated 10 years ago
- Hypervisor-base File Monitoring : monitoring file-related activities in VMs on XEN hypervisor☆9Updated 7 years ago
- [Not work] Deobfuscate obfuscated binaries!☆11Updated 8 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Solutions for various crackmes☆20Updated 12 years ago
- Fetch and set configuration values from IDAPython scripts☆21Updated 4 years ago
- ROP Payload Compiler☆11Updated 8 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆14Updated 10 years ago
- Exception detector for windows programs(x86 only)☆11Updated 8 years ago
- Old and probably outdated IDA plugins☆24Updated 8 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Updated 7 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Updated 12 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- collection of scripts and stuff☆12Updated 8 years ago
- ☆12Updated 7 years ago
- Cross-referencing network communication for detecting Advanced Persistent Threat (APT) malware☆6Updated 9 years ago
- Analysis and Modification Tool for Executables☆16Updated 6 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- ☆16Updated 7 years ago
- Tiny research project to understand code injections on Linux based systems☆13Updated 7 years ago
- IDA WhatAPIs PlugIn☆7Updated 9 years ago