Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.
☆10Sep 18, 2016Updated 9 years ago
Alternatives and similar repositories for derbycon-binary_ninja
Users that are interested in derbycon-binary_ninja are comparing it to the libraries listed below
Sorting:
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- ☆13Apr 30, 2016Updated 9 years ago
- HTTP Proxy using Amazon Lambda for source IP cycling☆15Apr 6, 2021Updated 4 years ago
- Malware diversity☆51Dec 2, 2015Updated 10 years ago
- Challenges used at the Cambridge 2 Cambridge event☆22May 26, 2016Updated 9 years ago
- Exploits used on hacking CTF's☆28Sep 16, 2019Updated 6 years ago
- TypeSan checks casts in C++ code - code released for CCS 2016☆36May 5, 2021Updated 4 years ago
- Useful Threat Hunting Stuff☆32Sep 1, 2020Updated 5 years ago
- Aim to be a fullstack MVC framework for Go lang☆14Aug 19, 2011Updated 14 years ago
- Building Charts in SharePoint 2013 using JavaScript and REST☆10May 3, 2013Updated 12 years ago
- Groovy-based Geb and Spock automation examples. Please run automation tests responsibly.☆11May 2, 2019Updated 6 years ago
- Source for some problems from PlaidCTF 2014.☆59May 2, 2014Updated 11 years ago
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 6 months ago
- This is the public repo for Sentinel Group's Sentrix which is a Service on the Sentinel Service Chain and utilizes the Matrix Server to d…☆11Apr 30, 2018Updated 7 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- port MaxRAMPercentage to Golang, adjust GC parameters(SetGCPercent/SetMemoryLimit) based on the target memory usage percentage, optimize …☆11Nov 25, 2024Updated last year
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Detect public repository dependencies in the GitHub repositories with an orphan required library.☆22Jun 24, 2025Updated 8 months ago
- ☆11Aug 7, 2021Updated 4 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated last year
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- Forward-looking approach in process mining (using system dynamics and process mining to simulate business processes)☆12Feb 16, 2023Updated 3 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- ☆14Oct 29, 2024Updated last year
- crawling china stock recommendation from Sina Weibo, create pyecharts for data☆11Jan 26, 2018Updated 8 years ago
- Next major release of sniffMyPackets - Now with added packet loving☆12Mar 19, 2015Updated 10 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- Class to help with adding logging function in smali output from 3rd party Android apps.☆10May 20, 2014Updated 11 years ago
- A little privilege escalator in Rust, for learning.☆15May 2, 2020Updated 5 years ago
- ☆12Nov 14, 2023Updated 2 years ago
- ☆12May 20, 2016Updated 9 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- A client to facilitate simple RESTful requests☆18Sep 7, 2010Updated 15 years ago
- Transclusion of files in emacs☆15Jan 27, 2020Updated 6 years ago
- ☆13Oct 31, 2017Updated 8 years ago