kasif-dekel / random-stuffLinks
bunch of random stuff
☆21Updated 5 years ago
Alternatives and similar repositories for random-stuff
Users that are interested in random-stuff are comparing it to the libraries listed below
Sorting:
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 6 years ago
- ☆32Updated last year
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆111Updated 5 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Extract annoations from Ghidra into an X32/X64 dbg database☆57Updated 4 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 4 years ago
- ☆36Updated 6 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Control Flow Guard Teleportation demo☆23Updated 6 years ago
- Hansel - a simple but flexible search for IDA☆25Updated 6 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Updated 7 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆43Updated 6 years ago
- Experiments on C/C++ Exploits☆21Updated 5 years ago
- My binary ninja plugin that encapsulate frida, unicorn, capstone and keystone☆74Updated 7 years ago
- IDAPython plugin for finding Xrefs from a function☆48Updated 9 years ago
- Automated library compilation and PDB annotation with CMake and IDA Pro☆22Updated 7 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 7 years ago
- Memory inspection REPL interface☆45Updated 8 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆56Updated 6 years ago
- Miscellanous scripts used for malware analysis☆23Updated 7 years ago
- Flare-On solutions☆37Updated 6 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 6 years ago
- Anything related to Ghidra☆12Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Binary matching with Binary Ninja☆21Updated last year
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆30Updated 5 years ago
- Ghidra plugin to communicate with radare2☆64Updated last week
- ☆17Updated 5 years ago
- Ghidra consonance and make it more ida-ish☆16Updated 6 years ago
- Regular expression Search on the command-line☆16Updated 7 months ago