A collection of tools for overwriting the MBR (Master Boot Record) of a machine with another file.
☆20Apr 15, 2014Updated 11 years ago
Alternatives and similar repositories for overwrite_mbr
Users that are interested in overwrite_mbr are comparing it to the libraries listed below
Sorting:
- utilities☆15Jul 2, 2013Updated 12 years ago
- Shellyzer Gui is a simple desktop application that helps you analyze shellcode (disassemble shellcode) in well view and i will add many f…☆12Jun 23, 2015Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- Tools made for Tizen Security Analysis☆14Jun 2, 2015Updated 10 years ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- Very simple runtime hooking library for OS X.☆15Aug 9, 2015Updated 10 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- DbgScript is a multi-script dbgeng (WinDbg, cdb, ntsd) extension. Use Python, Ruby or Lua to analyze data structures, or BYO provider.☆23Aug 15, 2016Updated 9 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- ☆16Jun 12, 2013Updated 12 years ago
- exploit development☆49Mar 14, 2018Updated 7 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- Introduce you to shellcode development.☆23Jun 8, 2016Updated 9 years ago
- network pcap fuzzer☆21Jan 19, 2015Updated 11 years ago
- Some slides from some presentations I have given☆25Jan 2, 2016Updated 10 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Feb 8, 2019Updated 7 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆57Nov 29, 2016Updated 9 years ago
- A CrackMe powered with a virtual machine.☆43Apr 13, 2015Updated 10 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- IDA AArch64 processor extender extension: Adding crypto extension instructions (AES/SHA1/SHA256)☆24Nov 26, 2016Updated 9 years ago
- a collection of useful scripts that for penetration testers☆35Jan 22, 2022Updated 4 years ago
- IDAPython script for quick vulnerability analysis☆32May 10, 2014Updated 11 years ago
- Collection of Praetorian solutions to CTF challenges☆25Apr 20, 2018Updated 7 years ago
- swffile.py - SWF file parser module in Python☆28Apr 4, 2016Updated 9 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Dec 9, 2015Updated 10 years ago
- ☆24Feb 21, 2016Updated 10 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- Z3 Symbolic Execution python☆28Dec 28, 2017Updated 8 years ago
- Collection of my Python Scripts☆41Aug 14, 2020Updated 5 years ago