karttoon / asm_buddy
Small script to assemble/disassemble from CLI
☆22Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for asm_buddy
- PCAUSA Rawether for Windows Local Privilege Escalation☆36Updated 7 years ago
- ☆30Updated 8 years ago
- ☆28Updated 7 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆37Updated 11 years ago
- Static analysis tools for x86 assembly☆13Updated 7 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit using GDI☆18Updated 7 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆41Updated 11 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- ☆27Updated 2 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Updated 12 years ago
- ☆33Updated 9 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆30Updated 7 years ago
- ☆33Updated 7 years ago
- IDAPython plugin for finding Xrefs from a function☆47Updated 8 years ago
- ☆41Updated 6 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆13Updated 7 years ago
- Sample libraries to be used with IAT Patcher☆33Updated 2 years ago
- Translate regular Assembly into Extended Instructions☆85Updated 12 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 6 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆33Updated 8 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 10 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆34Updated 7 years ago
- Ida Pro Ultimate Qt Build Guide☆26Updated 5 years ago
- Telegram bot for assembling and disassembling on-the-go.☆21Updated 2 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 7 years ago
- ☆26Updated 8 years ago