malware-unicorn / xori-ogLinks
☆16Updated 6 years ago
Alternatives and similar repositories for xori-og
Users that are interested in xori-og are comparing it to the libraries listed below
Sorting:
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- Flare-On solutions☆36Updated 5 years ago
- Personal repository for all ctf related stuffs☆67Updated 8 months ago
- Attacking the Core associated source files☆89Updated 7 years ago
- ☆52Updated 6 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- A Python tool to generate ROP chains☆64Updated 5 months ago
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆34Updated 6 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆92Updated 6 years ago
- pyGoRE - Python library for analyzing Go binaries☆64Updated 3 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- Write-ups for crackmes and CTF challenges☆52Updated 2 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 6 years ago
- ☆91Updated 5 years ago
- ☆135Updated 5 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago
- Reverse Engineering tools, scripts, and general commentary☆58Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- Binary Ninja Posters☆35Updated 4 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Updated 7 years ago
- IDAPython script to check ELF & PE/COFF for MS SDL banned.h policy violations and set breakpoints.☆35Updated last year
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆68Updated 5 years ago
- ☆32Updated last year
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago