locasto / libdisorderLinks
A simple C library for entropy measurement of byte streams and other data.
☆14Updated 5 years ago
Alternatives and similar repositories for libdisorder
Users that are interested in libdisorder are comparing it to the libraries listed below
Sorting:
- ☆24Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- Some yara rules and tools☆16Updated 11 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- Web based code browser using clang to provide basic code analysis.☆44Updated 8 years ago
- Memory awesomeness.☆29Updated 10 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- reverse engineering, visual binary analysis☆24Updated 8 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago
- Application for random attack on Green Petya's key☆24Updated 8 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆39Updated 12 years ago
- Repository for proxenet plugins☆14Updated 9 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 8 years ago
- fast dirtycow implementation with privilege escalation for amd64 in flatassembler.☆6Updated 8 years ago
- A GCC plugin implementing various stack canaries.☆14Updated 12 years ago
- ☆36Updated 12 years ago
- Format string exploit generation☆10Updated 9 years ago
- Packed Malware Analyzer (PACKMAN)☆12Updated 9 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆40Updated 11 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Run a windows process with many inputs and catch exit codes☆14Updated 9 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Updated 7 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 10 years ago
- ☆15Updated 8 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago