ghidraninja / ghidra_source_relLinks
Source distribution of the Ghidra software reverse engineering (SRE) framework https://www.nsa.gov/ghidra
☆9Updated 6 years ago
Alternatives and similar repositories for ghidra_source_rel
Users that are interested in ghidra_source_rel are comparing it to the libraries listed below
Sorting:
- Ghidra consonance and make it more ida-ish☆16Updated 6 years ago
- Automatically exported from code.google.com/p/hookme☆13Updated 9 years ago
- bunch of random stuff☆21Updated 5 years ago
- Decrypts Cisco VPN Group Passwords☆17Updated 13 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- A small python module to manipulate Windows Internals Process Monitor PMF Filter files☆15Updated 6 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 7 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Mass decryptor for Eazfuscator.net Symbol Names Encryption☆9Updated 6 years ago
- ☆13Updated 7 years ago
- ☆15Updated 8 years ago
- A medley of PoCs and exploits☆1Updated 5 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Casper is a tiny system tray application that can be used to view the invisible windows on your desktop.☆12Updated 8 years ago
- .NET Binary Deserializer/Serializer - For all formats: [MC-NBFX], [MC-NBFS], [MC-NBFSE]☆19Updated 6 years ago
- Disables ASLR flag IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE in IMAGE_OPTIONAL_HEADER on pre-compiled EXE. Works for both 32 and 64 bit Windo…☆20Updated 4 years ago
- Vulnerability Reports by Aleph Research☆36Updated last year
- Disassembler Library for x86 and x86-64☆8Updated 10 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆33Updated 7 years ago
- ROP gadget finder and analysis in pure Javascript☆29Updated 3 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago