fmonjalet / hexlighter
A hex/binary black box analysis tool
☆13Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for hexlighter
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆43Updated 8 years ago
- A multi-codec media fuzzing tool.☆42Updated 12 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆71Updated 7 years ago
- Network and USB protocol fuzzing toolkit.☆34Updated 7 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- ☆38Updated 9 years ago
- lte security☆41Updated 9 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 7 years ago
- ☆138Updated 6 years ago
- ARM rop chain gadget searcher☆37Updated 7 years ago
- Python implementation of zzuf mutator - little bit-flip atomic bomb☆71Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 9 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 7 years ago
- NCC Code Navigator☆54Updated 8 years ago
- Automatic ROP chain generator☆11Updated 9 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Updated 9 years ago
- Memory awesomeness.☆29Updated 9 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 8 years ago
- A little tool to execute functions without debugging an entire executable. Originally written by Gonzalo J. Carracedo (BatchDrake).☆28Updated 10 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆38Updated 7 years ago
- Dynamic security analysis of embedded systems’ firmwares☆80Updated 8 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- Our backup exploitation technique: fuzzing for POVs!☆25Updated 8 years ago
- XED based Disassembly Engine☆18Updated 6 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- Triton based R2 plugin for concolic execution and total control☆30Updated 5 years ago