guedou / r2scapy
a radare2 plugin that decodes packets with Scapy
☆33Updated 7 years ago
Alternatives and similar repositories for r2scapy:
Users that are interested in r2scapy are comparing it to the libraries listed below
- Material from our CANAPE workshop☆32Updated 6 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 6 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- Exploit Reliability Testing System☆34Updated 9 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆62Updated 7 years ago
- CANAPE Network Testing Tool☆32Updated 6 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆23Updated 6 years ago
- Snippets I used on exploit development, mostly broken.☆11Updated 7 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 8 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 6 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 6 years ago
- ☆21Updated 5 years ago
- ☆14Updated 4 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- 802.15.4 Fuzzer☆21Updated 5 years ago
- ☆33Updated 9 years ago
- Format string exploit generation☆10Updated 9 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago