Uncategorized utilities
☆55Jan 5, 2019Updated 7 years ago
Alternatives and similar repositories for Utilities
Users that are interested in Utilities are comparing it to the libraries listed below
Sorting:
- Patch kextd using radare2☆16Apr 10, 2015Updated 10 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- This is an OllyDbg plugin which will help you to import map files exported by IDA, Dede, IDR, Microsoft and Borland linkers.☆22Aug 12, 2015Updated 10 years ago
- Test case minimizer for afl-fuzz☆28Jul 19, 2017Updated 8 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- libs2e.so☆19Dec 19, 2020Updated 5 years ago
- OS X rootkit loader version #2☆12Apr 9, 2015Updated 10 years ago
- ☆12Jun 14, 2017Updated 8 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆54Jun 19, 2016Updated 9 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆57Nov 29, 2016Updated 9 years ago
- Hex-Rays Decompiler Enhanced View☆185Sep 21, 2018Updated 7 years ago
- 60 artisanal compiler crashes☆39Jul 17, 2016Updated 9 years ago
- IDAPython plugin for finding Xrefs from a function☆48Jul 14, 2016Updated 9 years ago
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 10 years ago
- ☆23May 11, 2017Updated 8 years ago
- IDA AArch64 processor extender extension: Adding crypto extension instructions (AES/SHA1/SHA256)☆24Nov 26, 2016Updated 9 years ago
- Redress Dissassembler is a cross platform binary disassembler written in Java with Capstone bindings☆24Mar 22, 2016Updated 10 years ago
- ☆22Mar 23, 2016Updated 9 years ago
- JNI method enumeration in ELF files☆50Jan 8, 2016Updated 10 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- JEFF file format tools☆27Dec 24, 2015Updated 10 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- Implementation of a thin hypervisor☆43May 20, 2016Updated 9 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆82Sep 10, 2016Updated 9 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Jul 25, 2014Updated 11 years ago
- Symbol REPL☆31Mar 4, 2018Updated 8 years ago
- Yet another Android Dex bytecode Disassembler: a static Android app disassembler for fast class and method signature extraction and code …☆30Dec 15, 2018Updated 7 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- ☆25Aug 10, 2018Updated 7 years ago
- Repo for the paper "USB Devices phoning home"☆22Feb 12, 2016Updated 10 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆99Nov 26, 2016Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Apr 20, 2016Updated 9 years ago
- fcatalog idapython client☆27Aug 19, 2016Updated 9 years ago
- Identifies common functions in iBSS/iBEC/iBoot/LLB☆31Oct 26, 2015Updated 10 years ago