WithSecureOpenSource / seeLinks
Sandboxed Execution Environment
☆819Updated 4 years ago
Alternatives and similar repositories for see
Users that are interested in see are comparing it to the libraries listed below
Sorting:
- BARF : A multiplatform open source Binary Analysis and Reverse engineering Framework☆1,421Updated 5 years ago
- Deprecated - MIG Memory Forensic library☆386Updated 3 years ago
- LLDB MCP Integration + other helpful commands☆728Updated 3 months ago
- Haka runtime☆450Updated 7 years ago
- Deprecated Binary Ninja prototype written in Python☆524Updated 4 years ago
- Binary analysis and management framework☆1,549Updated 2 years ago
- Distributed & real time digital forensics at the speed of the cloud☆1,205Updated 5 years ago
- How to backdoor Diffie-Hellman☆613Updated 8 years ago
- All your IPs are belong to us.☆670Updated 7 years ago
- Visual reverse engineering tool. Veles is better, use it. Don't use this.☆589Updated 4 years ago
- A Linux packet crafting tool.☆468Updated 4 years ago
- Malcom - Malware Communications Analyzer☆1,162Updated 7 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆415Updated 2 years ago
- Quantum Insert☆213Updated 6 years ago
- A libre cross-platform disassembler.☆1,443Updated 6 years ago
- Rekall Memory Forensic Framework☆1,962Updated 4 years ago
- Teach you a binary exploitation for great good.☆295Updated 6 years ago
- The DrK Attack - Proof of concept☆345Updated 3 years ago
- Monitor the output of terminals and processes.☆1,013Updated 9 years ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,671Updated last year
- Laika BOSS: Object Scanning System☆747Updated 7 months ago
- The dissection of a simple "hello world" ELF binary.☆464Updated 4 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆680Updated 3 years ago
- ☆816Updated 8 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago
- Incident Response Forensic Framework☆603Updated 5 years ago
- Tool for launching a Linux process from a snapshot☆449Updated 9 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆375Updated 3 years ago
- An instruction trace visualisation tool for dynamic program analysis☆372Updated 2 years ago