locasto / libdisorderLinks
A simple C library for entropy measurement of byte streams and other data.
☆14Updated 6 years ago
Alternatives and similar repositories for libdisorder
Users that are interested in libdisorder are comparing it to the libraries listed below
Sorting:
- ☆25Updated 10 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- ☆35Updated 13 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 7 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆43Updated 11 years ago
- A library for efficient interception of established TCP connections☆20Updated 10 years ago
- Repository for proxenet plugins☆14Updated 9 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
- Memory awesomeness.☆29Updated 10 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Updated 12 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- Web based code browser using clang to provide basic code analysis.☆46Updated 8 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 5 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- lte security☆42Updated 10 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 11 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Updated 9 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆48Updated 9 years ago
- Picon☆39Updated 8 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆48Updated last year
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- CTF exploit development and other tools of pwnage☆19Updated 6 years ago
- ☆27Updated 3 years ago
- ☆27Updated 10 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 10 years ago