gdelugre / fupyLinks
A small and dirty Python 2 decompiler written in Python.
☆13Updated 11 years ago
Alternatives and similar repositories for fupy
Users that are interested in fupy are comparing it to the libraries listed below
Sorting:
- ActionScript ByteCode Disassembler☆15Updated 9 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Updated 8 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 5 months ago
- Tool to analyze 64-bit binaries with 32-bit Hex-Rays Decompiler☆80Updated 10 years ago
- ☆46Updated 8 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Updated 8 years ago
- ☆28Updated 8 years ago
- Memory awesomeness.☆29Updated 10 years ago
- FWRF is a open source tool for firmware web-side analysis.☆12Updated 9 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- Format string exploit generation☆10Updated 9 years ago
- ☆26Updated 8 years ago
- An architecture plugin for binary ninja to disassemble raw python bytecode☆29Updated 7 years ago
- Disassembling binaries to neat asm sources.☆20Updated 7 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- ☆32Updated last year
- LPE exploits for Secret Net and Secret Net Studio☆51Updated 9 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆33Updated 7 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 10 years ago
- A Tool for Impersonating CAPTCHA Providers☆17Updated 13 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Fetch and set configuration values from IDAPython scripts☆24Updated 4 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- ☆65Updated 8 years ago
- Collection of IDA Pro plugins I wrote over the years☆23Updated 15 years ago
- Application Security library☆11Updated 12 years ago