Executable File Viewer
☆10Jul 27, 2016Updated 9 years ago
Alternatives and similar repositories for xiew
Users that are interested in xiew are comparing it to the libraries listed below
Sorting:
- Hex Calculator for Windows☆13Dec 2, 2016Updated 9 years ago
- KPMG Cyber Security Challenge 2017 questions repository and writeups☆19Apr 15, 2019Updated 6 years ago
- ☆10Oct 8, 2015Updated 10 years ago
- Redress Dissassembler is a cross platform binary disassembler written in Java with Capstone bindings☆24Mar 22, 2016Updated 9 years ago
- ☆23Dec 16, 2015Updated 10 years ago
- Shellyzer Gui is a simple desktop application that helps you analyze shellcode (disassemble shellcode) in well view and i will add many f…☆12Jun 23, 2015Updated 10 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- Little Ida pro gimmick, to use pip from python.☆10Jun 28, 2015Updated 10 years ago
- Fork because original project doesn't exist anymore☆19Sep 7, 2015Updated 10 years ago
- A PHP library to retrieve and properly format prayer data from external sources.☆11Nov 27, 2018Updated 7 years ago
- Minimal ARM/Thumb linear sweep disassembler similar to objdump☆10Jun 6, 2016Updated 9 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆10May 16, 2017Updated 8 years ago
- LSE recruitment 2016 - Memory Checker☆11Jul 3, 2016Updated 9 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- A toolset for extending closed-source Linux processes☆10Apr 12, 2016Updated 9 years ago
- A simple Windows x86-32 debugger☆10May 24, 2016Updated 9 years ago
- Z3 Symbolic Execution python☆28Dec 28, 2017Updated 8 years ago
- High level Java wrapper for capstone-java☆11Dec 15, 2015Updated 10 years ago
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 11 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- (ARM Thumb) Re-Assembler utility for reverse engineering☆17May 6, 2018Updated 7 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago
- Tools made for Tizen Security Analysis☆14Jun 2, 2015Updated 10 years ago
- ☆32Jul 7, 2015Updated 10 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 8 years ago
- A PowerShell binding for the Unicorn Engine☆17Dec 27, 2015Updated 10 years ago
- Modify Radiko Android Apk to bypass root check and Geolocation limitation.☆19Aug 28, 2018Updated 7 years ago
- The plugin is an integration of Virus Battle API to the well known IDA Disassembler.☆20May 26, 2015Updated 10 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- officefileinfo is a python script to help analyse the newer Microsoft Office file formats. There are numerous tools for dealing with the …☆16Apr 28, 2016Updated 9 years ago
- zer0m0n driver for cuckoo sandbox☆24Feb 24, 2015Updated 11 years ago
- Notes on reverse-engineering sphero☆20Jan 1, 2016Updated 10 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Aug 11, 2016Updated 9 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- Telegram bot for assembling and disassembling on-the-go.☆21Sep 20, 2022Updated 3 years ago
- CTF exploit development and other tools of pwnage☆19May 30, 2019Updated 6 years ago