kholia / dedropLinks
Looking inside the (Drop) box. Security Analysis of Dropbox. Updated WOOT '13 paper and other goodies.
☆330Updated 5 years ago
Alternatives and similar repositories for dedrop
Users that are interested in dedrop are comparing it to the libraries listed below
Sorting:
- BitErrant☆59Updated 8 years ago
- pyREtic is an extensible framework for in-memory Python 2.x bytecode reverse engineering☆268Updated 2 years ago
- Statically linked Library detector☆70Updated 10 years ago
- Universal disassembler for Python bytecode (supports Python 2 and 3)☆52Updated 14 years ago
- Decompiler for Python 3.3 (forked from https://code.google.com/p/unpyc3)☆70Updated 11 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 8 years ago
- KPlugs is a Linux kernel module which provides an interface for dynamically executing scripts inside the Linux kernel.☆146Updated 4 years ago
- webui repository for radare2☆99Updated last year
- Fork/mirror of Darcs repo for PyFlag (Forensic and Log Analysis GUI)☆36Updated 15 years ago
- A reversing series with radare2☆50Updated 9 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- Python Application to Reverse Freezing☆36Updated 9 years ago
- A Python library and tools providing easy access to the retdec.com decompilation service through their REST API.☆94Updated 7 years ago
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆105Updated 11 years ago
- Diary of a reverse-engineer☆39Updated 7 years ago
- A fork of cpython that supports building a static interpreter and true standalone executables☆202Updated 10 years ago
- Bindings of the r2 api for Valabind and friends☆135Updated last year
- A python library for making PDF files in a very low level way.☆72Updated 5 years ago
- Binary and Directory tree comparison tool using Fuzzy Hashing☆84Updated 10 years ago
- A Libemu Cython wrapper☆128Updated 2 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Updated 10 years ago
- Generate JSON system call info from Linux source☆149Updated 4 years ago
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆80Updated 8 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- Stealth's 64bit injectso port☆73Updated 15 years ago
- Breaks the encryption and obfuscation layers that Dropbox applies to their modified Python interpreter.☆87Updated 5 years ago
- Run IDA Pro disassembler in Docker containers for automating, scaling and distributing the use of IDAPython scripts.☆296Updated 8 years ago
- Fuzzing things with afl and python-afl☆59Updated 9 years ago
- Dear user: This is a git mirror of our Mercurial repository in https://bokken.inguma.eu that you can use if you prefer to use pull reque…☆120Updated 8 years ago
- SIGSTOPing ELF binaries since 0x7E1☆57Updated last year