Allows to execute haskell code in Ida Pro.
☆27Dec 22, 2015Updated 10 years ago
Alternatives and similar repositories for IdaHaskell
Users that are interested in IdaHaskell are comparing it to the libraries listed below
Sorting:
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Aug 25, 2014Updated 11 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- ☆64Oct 24, 2015Updated 10 years ago
- Convert Challenge Binaries to shared objects so service pollers can make use of the algorithm implementations☆14Feb 1, 2017Updated 9 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆57Nov 29, 2016Updated 9 years ago
- ☆27Mar 1, 2022Updated 4 years ago
- IDAtropy is a plugin for Hex-Ray's IDA Pro designed to generate charts of entropy and histograms using the power of idapython and matplot…☆142Apr 16, 2021Updated 4 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Little Ida pro gimmick, to use pip from python.☆10Jun 28, 2015Updated 10 years ago
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Oct 12, 2016Updated 9 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- ☆27Jan 27, 2017Updated 9 years ago
- cve-2014-4323 poc☆24Oct 15, 2015Updated 10 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- PE rebuilder, based on yoda's realigndll☆12Oct 1, 2011Updated 14 years ago
- Pintool to detect Read before Write memory access☆21Mar 20, 2013Updated 12 years ago
- Scripting Assembly Language☆12Sep 2, 2015Updated 10 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries…☆28Apr 23, 2021Updated 4 years ago
- Personal development branch for pcbre (probably not what you want)☆77Dec 9, 2022Updated 3 years ago
- CVE-2015-3636 exploit☆45Nov 22, 2015Updated 10 years ago
- ☆61Feb 8, 2016Updated 10 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆149Oct 5, 2017Updated 8 years ago
- ☆72Nov 27, 2018Updated 7 years ago
- RuCTFE 2015☆21Nov 25, 2015Updated 10 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- exploit dev. stuff☆20Aug 7, 2012Updated 13 years ago
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 5 years ago
- CVE-2015-1805 root tool☆13Oct 26, 2019Updated 6 years ago
- C-like language compiled to DCPU assembly☆45Sep 23, 2017Updated 8 years ago