Looking inside the (Drop) box. Security Analysis of Dropbox. Updated WOOT '13 paper and other goodies.
☆329Apr 24, 2020Updated 5 years ago
Alternatives and similar repositories for dedrop
Users that are interested in dedrop are comparing it to the libraries listed below
Sorting:
- A binary instrumentation tool based on Xposed framework for cracking enterprise level anti-tamper and obfuscation techniques, debunking m…☆15Dec 16, 2018Updated 7 years ago
- cve-2014-0130 rails directory traversal vuln☆19May 15, 2017Updated 8 years ago
- pyREtic is an extensible framework for in-memory Python 2.x bytecode reverse engineering☆268May 11, 2023Updated 2 years ago
- iOS10~iOS13 Edition) Dump Kext information from iOS kernel cache. Applicable to the kernel which dump from memory. The disassembly framew…☆21Dec 13, 2021Updated 4 years ago
- AArch64 assembler/disassembler support☆11Sep 7, 2017Updated 8 years ago
- import library.zip in memory, with the interface the same as zipimport.☆10Jan 10, 2026Updated last month
- Various Cryptographic-Related Formulae☆17Jan 12, 2025Updated last year
- IDA Pro plug-in to fix/extract/view RTTI information☆11Jan 23, 2018Updated 8 years ago
- ☆12Aug 16, 2022Updated 3 years ago
- Script to find exploitable magic methods for PHP object injection☆27Dec 4, 2014Updated 11 years ago
- A reversing series with radare2☆50Oct 24, 2016Updated 9 years ago
- ☆15May 23, 2019Updated 6 years ago
- An evolving hacking framework written in python☆11Jan 11, 2015Updated 11 years ago
- oneHookLibraryIOS☆11Dec 29, 2020Updated 5 years ago
- Generic cross-platform makefile for building C/C++/Objective-C libraries.☆14Aug 2, 2021Updated 4 years ago
- Domaintools addon for Maltego☆15Sep 13, 2012Updated 13 years ago
- 整理统计MacOSX的安全补丁与修复的漏洞☆10May 23, 2016Updated 9 years ago
- Writeups of CTF challenges I do☆13Sep 29, 2019Updated 6 years ago
- 这里存放的是一些自己写过的脚本,用以记录☆12Mar 30, 2018Updated 7 years ago
- Nintendo Entertainment System (NES) demo rom☆12Dec 31, 2014Updated 11 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- Collection of scripts for radare2☆27Jan 1, 2019Updated 7 years ago
- Convert gpsxml files to png files which can be opened in Qgis☆13Aug 16, 2016Updated 9 years ago
- A Python script for lldb that prints an Objective-C block signature and disassemble its invoke function☆14Apr 17, 2015Updated 10 years ago
- IDA2PAT_Reloaded for windows and mac osx☆13Sep 28, 2017Updated 8 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆18Mar 3, 2021Updated 5 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Feb 25, 2017Updated 9 years ago
- A coding challenge to learn Rust☆14Oct 19, 2017Updated 8 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆168Sep 24, 2016Updated 9 years ago
- Processes and metrics for assessing obfuscation effectiveness☆55Jan 26, 2017Updated 9 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Nov 17, 2017Updated 8 years ago
- ☆24Sep 26, 2017Updated 8 years ago
- RECon 2017 IDA skin & color scheme☆28Jun 16, 2017Updated 8 years ago
- ☆85Apr 10, 2023Updated 2 years ago
- LibreSSL with a backdoor in RSA key generation☆17Jun 26, 2016Updated 9 years ago
- ☆12Nov 9, 2025Updated 3 months ago
- Hosted receipt verification solution to in-app purchase bypass with tools like 'iAP Cracker'☆27Mar 1, 2014Updated 12 years ago
- Check a Windows PE file for some basic security flags☆12Jun 2, 2015Updated 10 years ago
- Maltego transform for OpenDNS Investigate API☆12Jan 6, 2015Updated 11 years ago