cyberark / Symda
☆15Updated 2 years ago
Alternatives and similar repositories for Symda:
Users that are interested in Symda are comparing it to the libraries listed below
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Repo with content from the sessions streamed on https://www.twitch.tv/viernesdecrypto☆16Updated 3 years ago
- ☆76Updated 3 weeks ago
- My talks and papers☆37Updated this week
- ☆28Updated 3 years ago
- Dixie Vuln Scanner Binja Plugin☆10Updated 11 months ago
- ☆15Updated last year
- Escape macOS Sandbox using sharedfilelistd exploit☆56Updated 2 months ago
- A cross-platform plugin for Ghidra that provides deep linking support. This enables the generation of clickable disas:// links that can b…☆36Updated last week
- ☆23Updated 9 months ago
- Diaphora Machine Learning tools and datasets☆19Updated 6 months ago
- A Ghidra extension for reverse-engineering macOS binaries.☆17Updated 2 months ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Frida plugin for Binary Ninja☆17Updated 2 months ago
- A collection of various exploits☆27Updated 6 months ago
- ☆17Updated 3 years ago
- ☆30Updated 2 months ago
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆37Updated last year
- Frida's setHardwareWatchpoint tutorial☆31Updated 5 months ago
- Redirect spawned iOS application stdout and stderr to pty☆28Updated last month
- Tools to bypass flawed SELinux policies using the init_module system call☆52Updated last year
- Type diagram plugin for JADX decompiler☆58Updated last month
- PoC plugin for jadx-gui to evaluate methods and update decompiler output☆21Updated 6 months ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆40Updated 2 months ago
- ☆12Updated 2 years ago
- This repository contains multiple exploits I have written for various CVEs and CTFs☆24Updated 9 months ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 2 years ago
- javascript extension of windbg for hacker.☆15Updated last year
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 3 months ago