strings for a Linux process' address space
☆51Jun 15, 2013Updated 12 years ago
Alternatives and similar repositories for pstrings
Users that are interested in pstrings are comparing it to the libraries listed below
Sorting:
- ☆12Jun 14, 2017Updated 8 years ago
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago
- ☆30Jun 22, 2020Updated 5 years ago
- Telegram bot for assembling and disassembling on-the-go.☆21Sep 20, 2022Updated 3 years ago
- It checks how secure the program you made is and shows how vulnerable your program is.☆20Apr 20, 2017Updated 8 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- (ARM Thumb) Re-Assembler utility for reverse engineering☆17May 6, 2018Updated 7 years ago
- Tools for reverse engineering the Utimaco Firmware☆43Jan 24, 2017Updated 9 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Axis2 RPC Shell☆15Sep 10, 2015Updated 10 years ago
- An implementation of jpnevulator in Python☆21Jan 30, 2018Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- Rogue AP killer☆92Jan 24, 2018Updated 8 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- ☆96Jul 10, 2018Updated 7 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- ld-linux code injector☆50Oct 28, 2011Updated 14 years ago
- ☆19Dec 2, 2017Updated 8 years ago
- Diameter TCP to SCTP proxy☆13Feb 4, 2012Updated 14 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- SIGSTOPing ELF binaries since 0x7E1☆57Aug 11, 2024Updated last year
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆23Oct 6, 2017Updated 8 years ago
- hook: linux kernel syscall hijack☆21Dec 28, 2016Updated 9 years ago
- DirBuster successor in Erlang☆37Feb 16, 2017Updated 9 years ago
- A light ELF binary patch tool in python urwid☆147Sep 12, 2019Updated 6 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- Linux bind shell with anti-reverse engineering techniques☆291Feb 9, 2017Updated 9 years ago
- Valgrind tool for tracing memory accesses☆13Feb 6, 2025Updated last year
- Trying for all arch detour stuff now☆11Feb 10, 2017Updated 9 years ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- Cython bindings for libpcap and libtins☆10Dec 19, 2016Updated 9 years ago