bmaia / binwallyLinks
Binary and Directory tree comparison tool using Fuzzy Hashing
☆85Updated 10 years ago
Alternatives and similar repositories for binwally
Users that are interested in binwally are comparing it to the libraries listed below
Sorting:
- The Zulu fuzzer☆125Updated 7 years ago
- Network and USB protocol fuzzing toolkit.☆34Updated 7 years ago
- A multi-codec media fuzzing tool.☆42Updated 12 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Python Application to Reverse Freezing☆36Updated 8 years ago
- ☆138Updated 7 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- NCC Code Navigator☆54Updated 9 years ago
- PoC for CVE-2015-6086☆69Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- Memory inspection REPL interface☆46Updated 7 years ago
- a 802.11 wireless fuzzer☆92Updated 12 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- hax 'n shit☆119Updated 10 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆78Updated 6 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Updated 8 years ago
- ☆14Updated 4 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- Python module to detect, analyze and id application bugs☆21Updated 3 weeks ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Updated 8 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- r2yara - Module for Yara using radare2 information☆35Updated last year
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago