hrw / python-syscalls
Python module to check for system call numbers
☆11Updated last year
Alternatives and similar repositories for python-syscalls:
Users that are interested in python-syscalls are comparing it to the libraries listed below
- Very simple cross-platform utility to manage your git identities.☆10Updated 2 years ago
- ptrace poke command-line tool☆14Updated 5 years ago
- Tool for working with memory of a running Linux process☆12Updated 4 years ago
- Data graphing library for command line.☆15Updated 3 years ago
- Utility to determine if ELF binary is built with debug sections☆9Updated 3 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆30Updated 9 years ago
- Detect which compiler and compiler version a Linux executable (in the ELF format) was compiled with☆30Updated last year
- PoC multi-layer protector for ELF32 x86 binaries☆11Updated 3 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆9Updated 5 years ago
- Load a statically-linked ELF binary(x86 architecture) without the execve syscall.☆42Updated 4 years ago
- Configure SPI flash write protection.☆23Updated 4 years ago
- Naive Proof of Concept Crypter for GNU/Linux ELF64☆11Updated 7 years ago
- A radare2 Python script to dump a raw IA32 binary to an NASM source file☆31Updated this week
- Dump sections or program entries from a ELF file☆21Updated 9 years ago
- Print core memory of a given a process ID (linux specific)☆11Updated 7 years ago
- Modifies running processes on Linux☆25Updated 2 years ago
- Source code on the 1.44MB 3.5 floppy accompanying the Windows NT File System Internals book.☆16Updated 5 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Updated 9 months ago
- ☆12Updated 7 years ago
- using capstone to assist in increasing the size of C++ objects☆15Updated 5 years ago
- ☆20Updated 5 years ago
- A Unicorn based emulator to deobfuscate Equation Group string XOR obfuscation☆31Updated 6 years ago
- File antivirus☆10Updated 5 years ago
- Transforms any file into a protected ELF executable☆28Updated 10 years ago
- DROB (Dynamic Rewriter and Optimizer of Binary code)☆24Updated 5 years ago
- It's a fuction that returns the length of an x86 instruction☆20Updated 13 years ago
- Ida Pro plugin to aid in reverse engineering Rust binaries.☆16Updated 4 months ago
- Sample showing the use of CoGetInterceptor☆21Updated 4 years ago
- ☆17Updated 6 years ago