develar / osslsigncodeLinks
☆22Updated 7 years ago
Alternatives and similar repositories for osslsigncode
Users that are interested in osslsigncode are comparing it to the libraries listed below
Sorting:
- python library for dumping a linux process from memory☆34Updated 14 years ago
- A cross-platform library for verifying Authenticode signatures☆150Updated 3 months ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Diaphora, a Free and Open Source program diffing tool☆23Updated 5 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- ☆16Updated last year
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆73Updated 5 years ago
- Execute system calls over the network☆11Updated 10 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 10 years ago
- C++ wrapper for YARA.☆45Updated 5 years ago
- Vivisect Structure Definition/Parsing Library☆23Updated 7 years ago
- ELF/PE/Mach-O parsing library☆50Updated last year
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- Pure Python parser for data encoded by .NET's BinaryFormatter☆50Updated 6 years ago
- Symbol REPL☆31Updated 7 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Updated 10 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 6 years ago
- Taggant System developed by the Malware Working Group of ICSG (Industry Connections Security Group) under the umbrella of IEEE☆33Updated 7 years ago
- A python script that can be used to scan data within in an IDB using Yara.☆22Updated 6 years ago
- Scan binaries for encryption algorithms/file systems/..☆16Updated 8 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- ELF/PE/Mach-O parsing library☆26Updated 7 months ago
- ROP gadget finder and analysis in pure Javascript☆29Updated 2 years ago
- Imports MSDN documentation into IDA Pro☆51Updated 13 years ago
- ☆51Updated 6 years ago
- ☆32Updated 11 months ago
- ☆13Updated 9 years ago