casperreverser / CasperReverseLinks
Here's a quick rundown of how I reversed the Casper API (https://casper.io)
☆58Updated 8 years ago
Alternatives and similar repositories for CasperReverse
Users that are interested in CasperReverse are comparing it to the libraries listed below
Sorting:
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- A practical tool for bytecode manipulation and creating Managed Code Rootkits (MCRs) in the Java Runtime Environment☆58Updated 5 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- BitErrant☆59Updated 8 years ago
- radare2 IO plugin for Linux and Android. Modifies files owned by other users via dirtycow Copy-On-Write cache vulnerability☆93Updated 6 years ago
- SIGSTOPing ELF binaries since 0x7E1☆57Updated last year
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Updated 11 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- Hacking Games in a Hacked Game☆28Updated 10 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 8 years ago
- Practice and learning in the world of C RE and exploit analysis☆33Updated 7 years ago
- Tool to analyze 64-bit binaries with 32-bit Hex-Rays Decompiler☆79Updated 10 years ago
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆105Updated 11 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 8 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Updated 11 years ago
- A place for disclosing things☆43Updated 9 years ago
- ☆15Updated 3 years ago
- A Python library and tools providing easy access to the retdec.com decompilation service through their REST API.☆94Updated 7 years ago
- tool to inspect, dump, modify, search and inject libraries into Android processes.☆124Updated 9 years ago
- Linux local root exploit for CVE-2014-0038☆199Updated 11 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Updated 10 years ago
- A search tool for IDA☆70Updated 9 years ago
- Misc PoCs for various research topics☆21Updated 3 years ago
- Clone of hidden tear written in C++☆70Updated 5 years ago
- Ida Pro Ultimate Qt Build Guide☆27Updated 7 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Updated 9 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Updated 10 years ago