citypw / lcamtuf-memfetchLinks
Memfetch is a simple utility to dump all memory of a running process, either immediately or when a fault condition is discovered. It is an attractive alternative to the vastly inferior search capabilities of many debuggers and tracers - and a convenient way to grab "screenshots" from many types of text-based interactive utilities.
☆41Updated 7 years ago
Alternatives and similar repositories for lcamtuf-memfetch
Users that are interested in lcamtuf-memfetch are comparing it to the libraries listed below
Sorting:
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆24Updated 8 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- Collection of scripts for radare2☆28Updated 6 years ago
- r2yara - Module for Yara using radare2 information☆34Updated last year
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- Memory awesomeness.☆29Updated 10 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 10 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- ActionScript ByteCode Disassembler☆15Updated 9 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- ☆32Updated 11 months ago
- An ELF parasite command injector.☆34Updated 7 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 8 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 8 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆25Updated 7 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- ☆24Updated 9 years ago