gdelugre / fupyLinks
A small and dirty Python 2 decompiler written in Python.
☆13Updated 11 years ago
Alternatives and similar repositories for fupy
Users that are interested in fupy are comparing it to the libraries listed below
Sorting:
- An architecture plugin for binary ninja to disassemble raw python bytecode☆29Updated 7 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Updated 8 years ago
- CTF exploit development and other tools of pwnage☆21Updated 6 years ago
- FWRF is a open source tool for firmware web-side analysis.☆12Updated 9 years ago
- Static Php Analysis and Fuzzer☆26Updated 11 years ago
- Exception detector for windows programs(x86 only)☆11Updated 8 years ago
- Format string exploit generation☆10Updated 9 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- ActionScript ByteCode Disassembler☆15Updated 9 years ago
- Tool to analyze 64-bit binaries with 32-bit Hex-Rays Decompiler☆79Updated 10 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Updated 8 years ago
- Memory awesomeness.☆29Updated 10 years ago
- fast dirtycow implementation with privilege escalation for amd64 in flatassembler.☆6Updated 8 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 4 months ago
- Collection of IDA Pro plugins I wrote over the years☆23Updated 15 years ago
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆9Updated 8 years ago
- A Tool for Impersonating CAPTCHA Providers☆17Updated 12 years ago
- GDB command for reattaching to the new instance of the process (help exploit development)☆12Updated 8 years ago
- Disassembling binaries to neat asm sources.☆20Updated 7 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Updated 10 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Updated 10 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13Updated 15 years ago
- The deadbeef module produces hexspeak for nefarious purposes.☆9Updated 9 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Updated 10 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 12 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆92Updated 8 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Scanner de vulnerabilidades Web.☆14Updated 9 years ago