armadito / armadito-mod-pdf
Armadito module for PDF document analysis.
☆18Updated 7 years ago
Alternatives and similar repositories for armadito-mod-pdf:
Users that are interested in armadito-mod-pdf are comparing it to the libraries listed below
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago
- ☆32Updated 8 months ago
- ☆24Updated 9 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- Fuzzer☆43Updated 10 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆53Updated 9 years ago
- Source code for the beta release of CobraDroid☆14Updated 4 years ago
- IRMA frontend☆25Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated 11 months ago
- Basic file metadata gathering script☆21Updated 3 years ago
- ☆16Updated 9 years ago
- please use https://github.com/fireeye/vivisect instead☆16Updated 6 months ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- ☆24Updated 9 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆16Updated last year
- Redress Dissassembler is a cross platform binary disassembler written in Java with Capstone bindings☆24Updated 8 years ago
- reverse engineering, visual binary analysis☆24Updated 8 years ago
- Swiss Army knife for raw bytes manipulation & interception☆55Updated last year
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- everyone can fuzz h2☆25Updated 5 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated last year
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 8 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆52Updated 10 years ago
- radare2 script to help on COM objects reverse engineering☆11Updated 7 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- SMC Utility for Apple Macintosh Computers☆13Updated 10 years ago