locasto / libdisorderLinks
A simple C library for entropy measurement of byte streams and other data.
☆14Updated 5 years ago
Alternatives and similar repositories for libdisorder
Users that are interested in libdisorder are comparing it to the libraries listed below
Sorting:
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- ☆25Updated 10 years ago
- Web based code browser using clang to provide basic code analysis.☆45Updated 8 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆40Updated 12 years ago
- Application for random attack on Green Petya's key☆25Updated 8 years ago
- ☆35Updated 13 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 9 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 7 years ago
- Memory awesomeness.☆29Updated 10 years ago
- Binary Analysis Platform☆74Updated 12 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 11 years ago
- Picon☆39Updated 8 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- Some yara rules and tools☆16Updated 11 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- Passive DHCP fingerprinting implementation☆51Updated 9 years ago
- Repository for proxenet plugins☆14Updated 9 years ago
- Triton based R2 plugin for concolic execution and total control☆33Updated 7 years ago
- ☆27Updated 3 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆50Updated last year
- lte security☆41Updated 10 years ago
- Run a windows process with many inputs and catch exit codes☆14Updated 9 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago