GCC Obfuscation Augmentation Tools
☆81Aug 27, 2023Updated 2 years ago
Alternatives and similar repositories for GOAT-Plugs
Users that are interested in GOAT-Plugs are comparing it to the libraries listed below
Sorting:
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- ☆38Dec 17, 2012Updated 13 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆22Oct 23, 2014Updated 11 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Jul 12, 2016Updated 9 years ago
- Another crash analyzer tool for the American Fuzzy Lop (AFL) fuzzer☆121Jan 17, 2017Updated 9 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- Imports MSDN documentation into IDA Pro☆52Jan 10, 2012Updated 14 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- Simple code to resolve library functions at runtime☆10Jan 5, 2015Updated 11 years ago
- Static Php Analysis and Fuzzer☆26Apr 22, 2014Updated 11 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- Rootkit☆24Nov 15, 2014Updated 11 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- ☆10Mar 3, 2024Updated 2 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆48Sep 28, 2016Updated 9 years ago
- Experiments with the gcc plugin mechanism☆112Dec 16, 2023Updated 2 years ago
- Code for blog series starting at http://tty.uchuujin.de/2016/02/stm32-from-scratch-bare-minimals/☆11Nov 22, 2020Updated 5 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- Python concolic execution framework for program analysis☆67Nov 13, 2014Updated 11 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Mar 1, 2016Updated 10 years ago
- JE3HHT 森OMが作成された、Windows上で動作するアンテナ設計解析プログラムです。☆12Dec 16, 2017Updated 8 years ago
- A simple example of dropping a PHP backdoor on a pfSense firewall over xmlrpc.php☆20Apr 16, 2015Updated 10 years ago
- A ruby library implementation of EMI/UCP protocol for SMS☆13Jun 28, 2021Updated 4 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- checksec-ng. Elf checksec in Python. Does large-scale package analysis. Now with multi-core support!☆68Mar 19, 2014Updated 12 years ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆48Apr 24, 2016Updated 9 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- An amd64 symbolic emulator☆314Aug 28, 2021Updated 4 years ago
- Implementation of Kuznechik cipher Russian standard GOST R 3412-2015 - 128 bit block size / 256 bit key - 8,16, 32, 64, 128-bit x86 versi…☆10Jun 27, 2016Updated 9 years ago
- ☆21Dec 21, 2020Updated 5 years ago
- ELF Infector's Toolkit☆64May 26, 2016Updated 9 years ago
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- Clone of the IDAPython repo☆23Mar 16, 2015Updated 11 years ago