locasto / libdisorder
A simple C library for entropy measurement of byte streams and other data.
☆14Updated 5 years ago
Alternatives and similar repositories for libdisorder:
Users that are interested in libdisorder are comparing it to the libraries listed below
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 9 years ago
- distributed www CMS spyder☆8Updated 7 years ago
- Exception detector for windows programs(x86 only)☆11Updated 7 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆11Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- ☆24Updated 9 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 11 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- ☆15Updated 8 years ago
- Yara Plugin for Binary Ninja☆13Updated 6 years ago
- ☆17Updated 7 years ago
- Run a windows process with many inputs and catch exit codes☆14Updated 9 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 9 years ago
- Anti live forensic linux LKM rootkit☆17Updated 7 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- ☆35Updated 12 years ago
- Athc0n 2012 CTF setups☆15Updated 9 years ago
- Heap analysis tooling for mempool☆13Updated 2 years ago
- Some yara rules and tools☆16Updated 10 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 7 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago
- Yet Another Repetitive Rootkit☆9Updated 11 years ago
- Exploit kit analyzer☆21Updated 9 years ago
- ☆13Updated 7 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago