landaire / wowsdeobLinks
☆20Updated 2 years ago
Alternatives and similar repositories for wowsdeob
Users that are interested in wowsdeob are comparing it to the libraries listed below
Sorting:
- Reverse engineering and generation toolkit for Chrome's private x-browser-validation header, used for integrity.☆276Updated 5 months ago
- Visualize binary files☆133Updated 3 months ago
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated 2 years ago
- nullpt.rs website☆58Updated 2 weeks ago
- Hello, World! written in seemingly "gibberish" x86 assembly using obfuscation on the assembly and machine code -level☆42Updated 2 years ago
- Dogma: A modernized metalanguage with better expressiveness and binary grammar support☆64Updated 2 years ago
- challenge 1 and 2 of Nudata on TicketMaster☆15Updated 9 months ago
- Repository for a library focused on binary analysis (mainly for Java related bytecodes)☆45Updated 3 months ago
- ☆13Updated 2 years ago
- ☆70Updated 2 years ago
- Some files with nasty names☆46Updated 8 years ago
- Repo for quick AST transformation nonsense.☆13Updated 4 years ago
- ☆424Updated last year
- rev.ng configuration for orchestra. The starting point for any development.☆36Updated last week
- Ghidra extension for exporting relocatable object files☆549Updated 3 weeks ago
- Dalvik bytecode disassembler and graph view☆65Updated last year
- LD_PRELOADable library for exploring the glibc heap☆108Updated 9 months ago
- Python wrapper for Cronet - Chromium's http library☆69Updated 9 months ago
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆123Updated 2 months ago
- Run the rr debugger in a Linux VM on apple silicon macOS or in the cloud. Use the rr debugger without HW performance counters on x86-64 a…☆95Updated last month
- Python 2.7 bytecode d̶e̶o̶b̶f̶u̶s̶c̶a̶t̶o̶r unfucker☆208Updated 2 years ago
- Fixes/Decrypts asar archives protected by asarmor and asarbreak.☆34Updated 7 months ago
- An exploit chain for the Magic Leap One (and probably other TX2 devices)☆72Updated 7 months ago
- ☆115Updated 2 years ago
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆53Updated 2 months ago
- F-Droid Fake Signer PoC☆126Updated 11 months ago
- Convert low ghidra pcode to verifiable C☆22Updated last year
- ☆24Updated 3 years ago
- jpg Acropalypse POC☆30Updated 2 years ago
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆104Updated last year