Automatically exported from code.google.com/p/burp-extensions
☆30Jul 24, 2019Updated 6 years ago
Alternatives and similar repositories for burp-extensions
Users that are interested in burp-extensions are comparing it to the libraries listed below
Sorting:
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Aug 31, 2020Updated 5 years ago
- ☆10Aug 8, 2015Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Jul 1, 2014Updated 11 years ago
- TrueType Font Fuzzer☆53Nov 6, 2015Updated 10 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Oct 14, 2014Updated 11 years ago
- INACTIVE - http://mzl.la/ghe-archive - Quokka is a utility to launch and monitor application for faults.☆40Apr 1, 2019Updated 6 years ago
- Valgrind extension for whitebox fuzz testing☆30Jul 10, 2009Updated 16 years ago
- Semantic Binary Code Analysis Framework☆124Sep 28, 2015Updated 10 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Repository to store unique seeds for DNS server fuzzing☆45Feb 18, 2016Updated 10 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Nov 28, 2013Updated 12 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- Windows SMEP Bypass U=S☆38Apr 8, 2016Updated 9 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆26Sep 3, 2016Updated 9 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Feb 23, 2015Updated 11 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60May 11, 2015Updated 10 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- ☆13Jun 25, 2016Updated 9 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- Automatic ROP chain generator☆12Mar 29, 2015Updated 10 years ago
- PE rebuilder, based on yoda's realigndll☆12Oct 1, 2011Updated 14 years ago
- library, which help to describe or load and execute PE files.☆13Jun 23, 2013Updated 12 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- ☆11Jun 10, 2015Updated 10 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- Enumerates very, very large directories quickly by directly using kernel syscalls. For POSIX and Windows. WARNING THIS IS OBSOLETE. USE B…☆15Aug 13, 2014Updated 11 years ago
- Scans a system for potential credit cards for PCI DSS compliance☆16Oct 30, 2016Updated 9 years ago
- Ossec cookbook for Chef, with secure & automated key management☆21Jun 13, 2013Updated 12 years ago
- Python static analyzer☆11Dec 26, 2016Updated 9 years ago
- ☆13Aug 12, 2015Updated 10 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Oct 23, 2017Updated 8 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago