Tools made for Tizen Security Analysis
☆14Jun 2, 2015Updated 10 years ago
Alternatives and similar repositories for tizen-security
Users that are interested in tizen-security are comparing it to the libraries listed below
Sorting:
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Z3 Symbolic Execution python☆28Dec 28, 2017Updated 8 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- Xposed module for obtaining SQLCipher crypto keys☆39Dec 6, 2017Updated 8 years ago
- PoC code for android RCE with multidex and ZIP files☆40Feb 1, 2016Updated 10 years ago
- Redress Dissassembler is a cross platform binary disassembler written in Java with Capstone bindings☆24Mar 22, 2016Updated 9 years ago
- network pcap fuzzer☆21Jan 19, 2015Updated 11 years ago
- Some slides from some presentations I have given☆25Jan 2, 2016Updated 10 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Tiny project with that demonstrates how to enable Return Flow Guard☆12Feb 7, 2017Updated 9 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- A Code highlighting plugin for OllyDbg 2.01.☆16Dec 10, 2014Updated 11 years ago
- Little Ida pro gimmick, to use pip from python.☆10Jun 28, 2015Updated 10 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- Android anti-root detection Proof of Concept☆44May 9, 2015Updated 10 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Aug 31, 2020Updated 5 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- CVE-2015-1805 root tool☆13Oct 26, 2019Updated 6 years ago
- Android kernel module to bypass SELinux at boot☆44Apr 10, 2016Updated 9 years ago
- Configurable, flexible regex-based APK modification tool.☆37Jun 26, 2017Updated 8 years ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- Exploit Android MSM8974 Chipset☆13Aug 20, 2015Updated 10 years ago
- rp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. It is open-source and has been tested …☆11Apr 2, 2016Updated 9 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- A x86 systematic ROP payload generation☆57Feb 28, 2020Updated 6 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago