Vector35 / deprecated-binaryninja-python
Deprecated Binary Ninja prototype written in Python
☆519Updated 3 years ago
Related projects: ⓘ
- - An Exploit Dev Swiss Army Knife.☆683Updated 2 years ago
- ☆321Updated this week
- A tool to help you write binary exploits☆603Updated 5 years ago
- Open source library that implements translator and tools for REIL (Reverse Engineering Intermediate Language)☆492Updated 3 years ago
- Repository to train/learn memory corruption on the ARM platform.☆353Updated 7 years ago
- random brain dumps☆346Updated 7 years ago
- Linux bind shell with anti-reverse engineering techniques☆283Updated 7 years ago
- binary patching from Python☆627Updated last year
- Exercises for learning Reverse Engineering and Exploitation.☆382Updated 5 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆446Updated 9 years ago
- yet another tool for analysing binaries☆460Updated 2 months ago
- Package Binary Code as a Python class using Binary Ninja and Unicorn Engine☆394Updated 2 years ago
- BARF : A multiplatform open source Binary Analysis and Reverse engineering Framework☆1,407Updated 4 years ago
- The DrK Attack - Proof of concept☆342Updated 2 years ago
- IDA Pro Instruction Reference Plugin☆636Updated 2 years ago
- Teach you a binary exploitation for great good.☆294Updated 5 years ago
- An amd64 symbolic emulator☆308Updated 3 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆284Updated 8 years ago
- Visualization of heap operations.☆601Updated 4 years ago
- ☆928Updated 3 weeks ago
- ☆216Updated this week
- Files from my DEFCON CTF VM.☆267Updated 8 years ago
- ☆276Updated 4 years ago
- A reverse engineering framework written in Python.☆494Updated 8 years ago
- Survey of program analysis research with a focus on machine code☆554Updated 4 years ago
- An instruction trace visualisation tool for dynamic program analysis☆364Updated last year
- An IDA Pro Plugin for embedding an IPython Kernel☆252Updated 5 years ago
- Official repository for Pyew.☆382Updated 5 years ago
- Documentation for the Mechanical Phish.☆229Updated 8 years ago
- Simplify format string exploitation.☆338Updated 2 years ago