agustingianni / UtilitiesLinks
Uncategorized utilities
☆57Updated 6 years ago
Alternatives and similar repositories for Utilities
Users that are interested in Utilities are comparing it to the libraries listed below
Sorting:
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆58Updated 8 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Updated 9 years ago
- Augmenting Static Reverse Engineering with Dynamic Analysis and Instrumentation☆133Updated 10 years ago
- A search tool for IDA☆70Updated 8 years ago
- ☆25Updated 7 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 8 years ago
- Alfred Workflow to convert hex string to assembly and vice versa☆24Updated 8 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Updated 8 years ago
- Programmatic disassembly and patching☆69Updated 8 years ago
- A code gadget finder based on capstone/keystone/pyelftools☆92Updated 8 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Updated 8 years ago
- ARM Shellcode Generator☆104Updated 8 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Updated 9 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆93Updated 9 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 10 years ago
- A "general-purpose" tracing tool☆39Updated 10 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 9 years ago
- Python concolic execution framework for program analysis☆67Updated 10 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 7 years ago
- ☆45Updated 7 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 9 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Updated 7 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Updated 9 years ago
- ELF header abuse☆48Updated 9 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 6 years ago
- An instrumentation script based on Frida which leverages Control Flow Guard to intercept indirect calls in CFG-enabled Windows binaries.☆29Updated 10 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- ☆25Updated 9 years ago
- SIGSTOPing ELF binaries since 0x7E1☆54Updated last year