Binary reversing tool to find all possible code paths between two functions.
☆28Apr 25, 2018Updated 7 years ago
Alternatives and similar repositories for codepaths
Users that are interested in codepaths are comparing it to the libraries listed below
Sorting:
- Security Advisories and Researches☆15Aug 19, 2014Updated 11 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- ☆11Nov 28, 2016Updated 9 years ago
- OpenSSH <=6.6 SFTP misconfiguration universal exploit☆27Mar 20, 2018Updated 8 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆21May 11, 2017Updated 8 years ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- ☆21Sep 10, 2024Updated last year
- ☆25Jan 18, 2015Updated 11 years ago
- Burp extension for processing requests and responses with Python.☆10Jun 19, 2018Updated 7 years ago
- Symfony2 < 2.5.4 profiler exploit☆13Sep 30, 2015Updated 10 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- Linux startup analyzer☆66Jun 2, 2025Updated 9 months ago
- Use Frida DBI to instrument binary and perform basic-block code coverage that is fed back to AFL.☆12Nov 23, 2019Updated 6 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Apr 25, 2013Updated 12 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- Various tools to track the Mirai botnet☆20Nov 3, 2016Updated 9 years ago
- Android 14 Beta 1 framework/services source code, reverse engineered from a Pixel 7 Pro (upb1.230309.014)☆17Apr 13, 2023Updated 2 years ago
- Android Debug Utility Suite☆17Apr 19, 2015Updated 10 years ago
- Static Php Analysis and Fuzzer☆26Apr 22, 2014Updated 11 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Dec 21, 2018Updated 7 years ago
- Modbus stager in assembly and some scripts to upload/download data to the holding register of a PLC☆44Jun 10, 2020Updated 5 years ago
- .NET Binary Deserializer/Serializer - For all formats: [MC-NBFX], [MC-NBFS], [MC-NBFSE]☆20Feb 25, 2019Updated 7 years ago
- Exploit code for CVE-2020-11579, an arbitrary file disclosure through the MySQL client in PHPKB☆25Feb 6, 2024Updated 2 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆24Nov 18, 2017Updated 8 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- Python 3 script for interacting with Shodan API☆20Nov 4, 2024Updated last year
- Exploit script for CVE-2020-7961☆18Jan 15, 2021Updated 5 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Mar 8, 2019Updated 7 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆17Feb 20, 2020Updated 6 years ago
- TCP tunneler over instant messaging clients (XMPP, Skype)☆24Jan 26, 2013Updated 13 years ago
- Simple network tools written with Scapy.☆23Mar 22, 2016Updated 10 years ago
- Dexter v2 - Point of Sales Trojan☆26Feb 25, 2015Updated 11 years ago
- egraph on top of sqlite☆13Mar 8, 2022Updated 4 years ago
- A number of samples to get you started with VTILs API.☆38Jul 28, 2021Updated 4 years ago
- Mimosa Framework to abuse EPC functionality on CISCO Routers.☆30Dec 12, 2024Updated last year
- encrypted-linux-kernel-modules☆12Nov 4, 2020Updated 5 years ago