magnussen7 / EmbucheLinks
Anti-reverse Compilation
☆34Updated 4 years ago
Alternatives and similar repositories for Embuche
Users that are interested in Embuche are comparing it to the libraries listed below
Sorting:
- ELF patching library in Python☆24Updated 4 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Write-ups for crackmes and CTF challenges☆51Updated 2 years ago
- Syscall hooking for reverse-engineering and anti-debug bypass on Linux x86 32/64☆42Updated 4 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- Cross-architecture instruction counting for CTF solving☆47Updated 3 years ago
- A library for patching ELFs☆56Updated 4 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated 2 weeks ago
- Binary Golf Library☆62Updated 4 years ago
- ☆48Updated 4 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- ☆28Updated 3 years ago
- ☆71Updated last year
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year
- Writeups for CTF challenges☆31Updated last year
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- ☆12Updated 3 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆54Updated 3 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- Malware dynamic instrumentation tool based on frida framework☆106Updated 5 years ago
- ☆43Updated 3 years ago
- An IDA Pro extension for easier (malware) reverse engineering☆115Updated 2 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- ☆62Updated 3 months ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- ☆76Updated 3 years ago