ghidraninja / ghidra_source_relLinks
Source distribution of the Ghidra software reverse engineering (SRE) framework https://www.nsa.gov/ghidra
☆9Updated 6 years ago
Alternatives and similar repositories for ghidra_source_rel
Users that are interested in ghidra_source_rel are comparing it to the libraries listed below
Sorting:
- Ghidra consonance and make it more ida-ish☆16Updated 6 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- All TMF files that I extracted from Microsoft PDBs.☆12Updated 5 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- A medley of PoCs and exploits☆1Updated 5 years ago
- ☆32Updated 11 months ago
- Some of the vulnerabilities that were found by Cybellum platform☆33Updated 7 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 7 years ago
- Decrypts Cisco VPN Group Passwords☆17Updated 13 years ago
- Python module to detect, analyze and id application bugs☆21Updated 2 weeks ago
- Automatically exported from code.google.com/p/hookme☆13Updated 9 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- Disassembler Library for x86 and x86-64☆8Updated 10 years ago
- Format string exploit generation☆10Updated 9 years ago
- A small python module to manipulate Windows Internals Process Monitor PMF Filter files☆15Updated 6 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- bunch of random stuff☆21Updated 5 years ago
- python-deepviz is a python wrapper for deepviz.com REST APIs☆11Updated 8 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- SMC Utility for Apple Macintosh Computers☆13Updated 10 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- CDitter - Electromechanical based data exfiltration, through the movement of a CD drive☆12Updated 2 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Collection of cracked malware☆14Updated 6 years ago
- Brainfuck architecture module and loader for Binary Ninja☆15Updated 3 years ago
- ☆24Updated 6 years ago
- FWRF is a open source tool for firmware web-side analysis.☆12Updated 9 years ago
- Mobile Application Vulnerability Detection☆12Updated 8 years ago