locasto / libdisorder
A simple C library for entropy measurement of byte streams and other data.
☆14Updated 5 years ago
Alternatives and similar repositories for libdisorder
Users that are interested in libdisorder are comparing it to the libraries listed below
Sorting:
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Exception detector for windows programs(x86 only)☆11Updated 8 years ago
- A tiny tool to learn the assembly code☆11Updated 8 years ago
- ☆24Updated 9 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Updated 9 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- Solutions for various crackmes☆20Updated 12 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 10 years ago
- Debugger for HTC phones bootloader (HBOOT).☆19Updated 11 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆12Updated 10 years ago
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- ☆15Updated 8 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 11 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- ☆17Updated 7 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- collection of scripts and stuff☆12Updated 8 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago
- Tool to resolve symbols by the address of the binary☆15Updated 6 years ago
- ☆11Updated 9 years ago
- Some yara rules and tools☆16Updated 11 years ago
- Yet Another Repetitive Rootkit☆9Updated 11 years ago