casperreverser / CasperReverse
Here's a quick rundown of how I reversed the Casper API (https://casper.io)
☆58Updated 7 years ago
Alternatives and similar repositories for CasperReverse:
Users that are interested in CasperReverse are comparing it to the libraries listed below
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 8 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- Running Key Cipher Decoder + other classic cipher decoders. Automatically discovers likely solutions using an NGram language model.☆39Updated 7 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 7 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- BitErrant☆58Updated 8 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 8 years ago
- A search tool for IDA☆70Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- ☆72Updated 6 years ago
- A simpe decoder to decode requests/responses made by PokemonGo in burp☆24Updated 8 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 5 months ago
- ☆72Updated 10 years ago
- Tool to analyze 64-bit binaries with 32-bit Hex-Rays Decompiler☆80Updated 10 years ago
- ☆16Updated 6 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- ☆79Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 10 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- SIGSTOPing ELF binaries since 0x7E1☆52Updated 8 months ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 7 years ago
- Some kernel exploits☆144Updated 7 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆70Updated 10 years ago
- CTF Writeups☆10Updated 8 years ago