kholia / dedropLinks
Looking inside the (Drop) box. Security Analysis of Dropbox. Updated WOOT '13 paper and other goodies.
☆330Updated 5 years ago
Alternatives and similar repositories for dedrop
Users that are interested in dedrop are comparing it to the libraries listed below
Sorting:
- pyREtic is an extensible framework for in-memory Python 2.x bytecode reverse engineering☆268Updated 2 years ago
- Generate JSON system call info from Linux source☆149Updated 4 years ago
- KPlugs is a Linux kernel module which provides an interface for dynamically executing scripts inside the Linux kernel.☆145Updated 4 years ago
- Decompiler for Python 3.3 (forked from https://code.google.com/p/unpyc3)☆70Updated 11 years ago
- A Python library and tools providing easy access to the retdec.com decompilation service through their REST API.☆94Updated 7 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 8 years ago
- Statically linked Library detector☆70Updated 10 years ago
- BitErrant☆59Updated 8 years ago
- webui repository for radare2☆98Updated last year
- Universal disassembler for Python bytecode (supports Python 2 and 3)☆52Updated 14 years ago
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆80Updated 8 years ago
- A fork of cpython that supports building a static interpreter and true standalone executables☆201Updated 9 years ago
- Breaks the encryption and obfuscation layers that Dropbox applies to their modified Python interpreter.☆87Updated 5 years ago
- Stealth's 64bit injectso port☆73Updated 15 years ago
- ☆38Updated 10 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- A small command-line TCP proxy utility written in Python☆156Updated 6 years ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
- Diary of a reverse-engineer☆39Updated 7 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Updated 10 years ago
- A reversing series with radare2☆49Updated 9 years ago
- ☆35Updated 13 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Updated 4 years ago
- trace local function calls like strace and ltrace☆70Updated 8 years ago
- Run IDA Pro disassembler in Docker containers for automating, scaling and distributing the use of IDAPython scripts.☆293Updated 7 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 10 years ago
- setroubleshootd xSports☆93Updated 8 years ago
- a tool to identify cryptographic hashes, encodings, and other artifacts in a byte stream according to traces of its representation☆135Updated 3 weeks ago
- ☆91Updated last year
- NASM Standard Library for shellcode☆69Updated 9 years ago