epinna / codepaths
Binary reversing tool to find all possible code paths between two functions.
☆24Updated 6 years ago
Related projects: ⓘ
- a radare2 plugin that decodes packets with Scapy☆33Updated 6 years ago
- Swiss Army knife for raw bytes manipulation & interception☆54Updated last year
- ☆32Updated 3 months ago
- ☆20Updated this week
- The Damn Vulnerable Router Firmware Project☆30Updated 6 years ago
- CANAPE Network Testing Tool☆31Updated 5 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 5 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 2 years ago
- Format string exploit generation☆9Updated 9 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- ☆36Updated 4 years ago
- 802.15.4 Fuzzer☆21Updated 5 years ago
- ☆18Updated this week
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 11 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆50Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 7 years ago
- Miscellanous scripts used for malware analysis☆23Updated 5 years ago
- SIGSTOPing ELF binaries since 0x7E1☆50Updated last month
- API functions for Malware Research☆35Updated 5 years ago
- Cryptographic Dataset Generation & Modelling Framework☆38Updated 4 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆34Updated 5 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Regular expression Search on the command-line☆15Updated 5 months ago
- Damn vulnerable linux device driver for people to play with.☆26Updated 4 years ago
- An ELF parasite command injector.☆34Updated 6 years ago
- Organise and access data collected during internal network pentests☆8Updated 4 years ago
- Volatility plugin to extract X screenshots from a memory dump☆36Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- pure Python binary analysis framework☆21Updated 5 years ago