A Libemu Cython wrapper
☆129Nov 29, 2023Updated 2 years ago
Alternatives and similar repositories for pylibemu
Users that are interested in pylibemu are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- IDA Pro plug-in and tools for displaying 3D graphs of procedures using UbiGraph☆26Jun 8, 2013Updated 12 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- Scripts for detecting Duqu drivers and other elements☆20Nov 10, 2011Updated 14 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆16May 22, 2015Updated 10 years ago
- Code coverage analysis tools for the PIN Toolkit☆60Jun 8, 2013Updated 12 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 11 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- Reverse-engineering tools for Android applications☆56Aug 2, 2011Updated 14 years ago
- Python low-interaction honeyclient☆1,023Updated this week
- PHP extension for web-application dynamic analysis.☆27Sep 21, 2018Updated 7 years ago
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A lightweight web application firewall module for nginx, which is already used in the production environment.☆14Mar 20, 2014Updated 12 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- ☆12Jun 7, 2018Updated 7 years ago
- Python wrapper for http://nacl.cace-project.eu/☆30Nov 8, 2021Updated 4 years ago
- 浏览器XSS 过滤器Fuzzing 框架 (browser xss aduit fuzzing framework )..☆15Sep 13, 2016Updated 9 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago
- ☆50Dec 28, 2012Updated 13 years ago
- A few IDAPython scripts to generate class hierarchy diagrams from IDBs☆35Jan 10, 2012Updated 14 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Windows DLL Loading Utility☆12Jun 11, 2020Updated 5 years ago
- Java hex viewer component☆20Mar 4, 2011Updated 15 years ago
- BinCrowd Plugin for IDA Pro☆44Jan 10, 2012Updated 14 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- Bro analyzer that detects Google's QUIC protocol☆10Mar 2, 2021Updated 5 years ago
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- ☆32Jun 19, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Smart DLL execution for malware analysis in sandbox systems☆144Feb 16, 2015Updated 11 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- ☆28Feb 14, 2018Updated 8 years ago
- A free decentralized open DNS system!☆80Updated this week
- Clickjacking Proof-of-Concept Exploit☆26Oct 1, 2020Updated 5 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Apr 1, 2018Updated 8 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago