casperreverser / CasperReverseLinks
Here's a quick rundown of how I reversed the Casper API (https://casper.io)
☆58Updated 8 years ago
Alternatives and similar repositories for CasperReverse
Users that are interested in CasperReverse are comparing it to the libraries listed below
Sorting:
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- ☆72Updated 6 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- SIGSTOPing ELF binaries since 0x7E1☆54Updated 11 months ago
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆104Updated 10 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆70Updated 10 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- A practical tool for bytecode manipulation and creating Managed Code Rootkits (MCRs) in the Java Runtime Environment☆58Updated 5 years ago
- ☆79Updated 9 years ago
- A search tool for IDA☆70Updated 8 years ago
- Clone of hidden tear written in C++☆70Updated 4 years ago
- Hacking Games in a Hacked Game☆29Updated 10 years ago
- ELF header abuse☆48Updated 9 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 8 years ago
- BitErrant☆59Updated 8 years ago
- Tool to analyze 64-bit binaries with 32-bit Hex-Rays Decompiler☆79Updated 10 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Updated 11 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- Linux local root exploit for CVE-2014-0038☆194Updated 11 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆50Updated 8 months ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Ida Pro Ultimate Qt Build Guide☆27Updated 6 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Vulnerability research and development.☆25Updated 10 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 10 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago