jbremer / ssexyView external linksLinks
Translate regular Assembly into Extended Instructions
☆88Oct 9, 2012Updated 13 years ago
Alternatives and similar repositories for ssexy
Users that are interested in ssexy are comparing it to the libraries listed below
Sorting:
- ☆25Apr 8, 2016Updated 9 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- Static Php Analysis and Fuzzer☆26Apr 22, 2014Updated 11 years ago
- BinCrowd Plugin for IDA Pro☆44Jan 10, 2012Updated 14 years ago
- This firewall allows only communications made from allowed processes.☆13Aug 10, 2016Updated 9 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- Little Ida pro gimmick, to use pip from python.☆10Jun 28, 2015Updated 10 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆26Sep 3, 2016Updated 9 years ago
- cve-2014-4323 poc☆24Oct 15, 2015Updated 10 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- Pintool to detect Read before Write memory access☆21Mar 20, 2013Updated 12 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 9 years ago
- Support UEFI load☆11Oct 1, 2015Updated 10 years ago
- Collection of my IDAPython scripts☆33Sep 17, 2015Updated 10 years ago
- A few IDAPython scripts to generate class hierarchy diagrams from IDBs☆35Jan 10, 2012Updated 14 years ago
- Documentation of the VTIL API.☆32Nov 1, 2020Updated 5 years ago
- ☆38Dec 17, 2012Updated 13 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆141Sep 19, 2018Updated 7 years ago
- Processes and metrics for assessing obfuscation effectiveness☆55Jan 26, 2017Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆57Nov 29, 2016Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- An Android port of the general purpose honggfuzz fuzzer☆19Aug 20, 2015Updated 10 years ago
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- ☆23Jan 10, 2012Updated 14 years ago
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago
- A simple Windows x86-32 debugger☆10May 24, 2016Updated 9 years ago
- An easy and powerful assembler engine in python.☆54Sep 8, 2019Updated 6 years ago
- Return Oriented Programme Evolution with ROPER☆171Apr 25, 2019Updated 6 years ago
- ☆36Feb 18, 2013Updated 12 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- E-Graph library☆20Apr 4, 2024Updated last year
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- This PoC illustrates our work on asymmetric white-box cryptography, it can be used to generate a set of lookup tables used for lattice-ba…☆21Mar 24, 2021Updated 4 years ago