libyal / libhmac
Library to support various Hash-based Message Authentication Codes (HMAC)
☆10Updated 6 months ago
Alternatives and similar repositories for libhmac:
Users that are interested in libhmac are comparing it to the libraries listed below
- Library to support cross-platform AES encryption☆12Updated 7 months ago
- ☆16Updated 7 years ago
- Services and Drivers control application☆19Updated 7 years ago
- Utility for dumping all the information Capstone has on given instructions.☆24Updated 3 years ago
- ptrace poke command-line tool☆14Updated 5 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Updated 9 months ago
- DLL Injection commandline utility☆26Updated 12 years ago
- Redress Dissassembler is a cross platform binary disassembler written in Java with Capstone bindings☆24Updated 9 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Updated 10 years ago
- Dalvik Header Plugin for IDA Pro☆22Updated 12 years ago
- MBR manipulation tool☆17Updated 11 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- IDA Pro Instruction Reference Plugin☆14Updated 5 years ago
- Library for binary signature scanning.☆28Updated 8 months ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Updated 9 months ago
- Old and probably outdated IDA plugins☆24Updated 8 years ago
- Solutions for various crackmes☆20Updated 12 years ago
- ☆16Updated 9 years ago
- runtime code injector for Linux☆27Updated 13 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆9Updated 5 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Updated 7 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆14Updated 10 years ago
- Fetch and set configuration values from IDAPython scripts☆21Updated 4 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 8 years ago