a plugin to calculate complexity of executable's functions
☆18May 17, 2022Updated 3 years ago
Alternatives and similar repositories for CycloComplexityCalc
Users that are interested in CycloComplexityCalc are comparing it to the libraries listed below
Sorting:
- Implementation of Max Kellermann's exploit for CVE-2022-0847☆12Mar 8, 2022Updated 3 years ago
- Runtime Runtime-Oriented Programming (ROP) protection☆11Feb 17, 2019Updated 7 years ago
- Heappo 🦛 is a PyKD based extensions for WinDBG which aids Heap Exploitation☆14Mar 25, 2020Updated 5 years ago
- LILO based Pulse Secure appliance disk image decryptor☆13Mar 20, 2024Updated last year
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Aug 17, 2019Updated 6 years ago
- Research into Apple PPP and CCL components☆19Jun 8, 2019Updated 6 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 6 years ago
- KFLAT is a tool to serialize memory of selected variables from the running Linux kernel and organize it into a single memory block of con…☆30Jan 20, 2026Updated last month
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- White-box analytic framework based on LLVM☆39Jun 10, 2019Updated 6 years ago
- ☆74Jul 2, 2024Updated last year
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆59Dec 7, 2021Updated 4 years ago
- Juliet C/C++ Dynamic Test Suite☆35Apr 18, 2023Updated 2 years ago
- Proof of concept code for CVE-2023-2008☆40Jun 12, 2023Updated 2 years ago
- IDA SDK tech demo☆39May 25, 2020Updated 5 years ago
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆40Jul 27, 2021Updated 4 years ago
- Kernel Read Write Execute☆84Aug 30, 2024Updated last year
- Recover control flow graph from obfuscated codes☆37Jul 18, 2015Updated 10 years ago
- ☆39Sep 27, 2022Updated 3 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- WinDbg plugin to trace module transitions from a debugged driver.☆40Dec 22, 2025Updated 2 months ago
- ☆42Aug 4, 2020Updated 5 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Nov 20, 2015Updated 10 years ago
- ☆12Dec 14, 2016Updated 9 years ago
- Generate a PDB file given the old PDB file and an address mapping☆52Aug 3, 2025Updated 6 months ago
- ☆12Feb 8, 2021Updated 5 years ago
- ☆12Aug 31, 2018Updated 7 years ago
- LibAFL-based snapshot fuzzer to fuzz TMNF's RPC interface. Includes a free RCE exploit!☆41Jan 20, 2023Updated 3 years ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- Primarily aimed at replicating files that cannot be directly copied due to being in use.☆11Apr 22, 2024Updated last year
- A clone of FD (File & Directory tool) by T.Shirai☆16Jan 29, 2014Updated 12 years ago
- Powershell to read ETL file on an interval and convert it to an EVTX (so Windows Event Forwarding can 'subscribe')☆11May 16, 2017Updated 8 years ago
- A (concrete or symbolic) implementation of IEEE-754 / SMT-LIB floating-point☆51Nov 16, 2025Updated 3 months ago
- Unicorn PE function runner☆59Jul 4, 2017Updated 8 years ago
- Antlr4 / Javascript example☆10Mar 3, 2018Updated 7 years ago
- Minimal C port of UTF8-CPP☆12Jun 2, 2019Updated 6 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago