erocarrera / reverse-engineering-scripts
Automatically exported from code.google.com/p/reverse-engineering-scripts
☆18Updated 10 years ago
Alternatives and similar repositories for reverse-engineering-scripts
Users that are interested in reverse-engineering-scripts are comparing it to the libraries listed below
Sorting:
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- python-deepviz is a python wrapper for deepviz.com REST APIs☆11Updated 8 years ago
- NoREpls - Application designed for the purposes of reverse engineering.☆11Updated 6 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- ☆28Updated 7 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- Disassembler Library for x86 and x86-64☆8Updated 10 years ago
- A simple exploitable ActiveX control for RE/VR☆19Updated 10 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- ☆16Updated 2 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- Old and probably outdated IDA plugins☆24Updated 8 years ago
- Sample libraries to be used with IAT Patcher☆33Updated 2 years ago
- Dalvik Header Plugin for IDA Pro☆22Updated 12 years ago
- Solutions for various crackmes☆20Updated 12 years ago
- Source code on the 1.44MB 3.5 floppy accompanying the Windows NT File System Internals book.☆16Updated 5 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- ☆13Updated 7 years ago
- ☆20Updated 5 years ago
- AutoCmdLine Plugin (x64) - A Plugin For x64dbg☆11Updated 6 years ago
- ☆22Updated 4 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Debugger checks in 3 ways☆19Updated 7 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Malware analyses and helpful scripts☆29Updated 2 years ago
- Analysis and Modification Tool for Executables☆16Updated 6 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆27Updated 10 years ago
- ☆28Updated 3 years ago