carstein / KeyholeLinks
Simple reporting plugin for binary ninja
☆16Updated 6 years ago
Alternatives and similar repositories for Keyhole
Users that are interested in Keyhole are comparing it to the libraries listed below
Sorting:
- Binary Ninja Posters☆35Updated 4 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 8 years ago
- A pin tool to visualise heap operations☆21Updated 10 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆51Updated 7 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- ☆49Updated 7 years ago
- ARM rop chain gadget searcher☆38Updated 7 years ago
- ☆45Updated 7 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Updated 8 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆51Updated 7 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Updated 8 years ago
- BinCrowd Plugin for IDA Pro☆42Updated 13 years ago
- Routines for hunting down kernel structs.☆41Updated 14 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago
- Binary Analysis Platform☆74Updated 11 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 8 years ago
- A fuzz job for ClamAV☆32Updated 9 years ago
- IDATACO IDA Pro Plugin☆47Updated 9 years ago
- Memory inspection REPL interface☆45Updated 7 years ago
- A Python tool to generate ROP chains☆64Updated 8 months ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 8 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago
- AFL "mostly" ported to cygwin☆26Updated 9 years ago
- Our backup exploitation technique: fuzzing for POVs!☆23Updated 9 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 9 years ago
- An architecture plugin for binary ninja to disassemble raw python bytecode☆29Updated 7 years ago