icchy / peLinks
simple PE parser
☆12Updated 8 years ago
Alternatives and similar repositories for pe
Users that are interested in pe are comparing it to the libraries listed below
Sorting:
- Kernel debugger using Timeless Debugging method.☆74Updated 8 years ago
- Simple high-interactive client honeypot☆25Updated 8 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Updated 7 years ago
- ☆16Updated 8 years ago
- ☆21Updated 8 years ago
- Windows API tracer for malware (oldname: unitracer)☆119Updated 8 years ago
- CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux☆24Updated 2 months ago
- ☆105Updated 10 years ago
- gdbserver implementation on BitVisor☆24Updated 7 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 9 years ago
- Triton based R2 plugin for concolic execution and total control☆33Updated 6 years ago
- ROPChain generator.☆40Updated 7 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Updated 5 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆69Updated 8 years ago
- Extension for GDB☆108Updated last year
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆96Updated 7 years ago
- SECCON2016 online CTF for public☆28Updated 8 years ago
- A x86 systematic ROP payload generation☆56Updated 5 years ago
- Some stuff for CTF.☆11Updated 6 years ago
- ☆81Updated 8 years ago
- Past presentation materials☆10Updated 7 years ago
- Valgrind for kernel mode software.☆26Updated 9 years ago
- KVM-based memory access recorder☆20Updated 7 years ago
- P3DA - Python3 Exploit Development Assistance for GDB☆40Updated 10 years ago
- ☆10Updated 9 years ago
- ☆13Updated 3 months ago
- Some stuffs for CODE BLUE 2016☆23Updated 9 years ago
- ☆14Updated 7 years ago
- r2con 2017 September 6-9☆97Updated 8 years ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Updated 8 years ago