A Python IDA Plugin that finds a route from one function to another.
☆12Dec 6, 2018Updated 7 years ago
Alternatives and similar repositories for IDA-Function-Route-Finder
Users that are interested in IDA-Function-Route-Finder are comparing it to the libraries listed below
Sorting:
- ☆537Feb 19, 2026Updated last week
- A repository teaching bss/data segment exploitation techniques.☆13Aug 11, 2019Updated 6 years ago
- UAdmin Phishlets for common sites☆16Jun 12, 2025Updated 8 months ago
- A fast generative fuzzer for HTTP☆16Nov 29, 2018Updated 7 years ago
- A small utility to grep for pointers & binary data in memory dumps / live process memory☆24Jul 16, 2018Updated 7 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆47Aug 27, 2020Updated 5 years ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Stealthy Stand Alone PHP Web Shell☆33Sep 12, 2019Updated 6 years ago
- ☆10Sep 3, 2021Updated 4 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- BadUSB ile Penetrasyon☆13Jun 15, 2019Updated 6 years ago
- A generator for malicious DLL files for DLL Hijacking attacks☆32Dec 6, 2019Updated 6 years ago
- RPM Signal Generator V2.0☆10Oct 17, 2017Updated 8 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- ☆48Jun 30, 2020Updated 5 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Proof-of-concept implementation for the paper "Homomorphic Encryption for Large Integers from Nested Residue Number Systems", presented a…☆27Jun 4, 2025Updated 8 months ago
- ☆37Jun 7, 2019Updated 6 years ago
- CNVD-C-2019-48814 Weblogic wls9_async_response 反序列化利用工具☆36Jun 3, 2019Updated 6 years ago
- A feature-complete reference implementation of a modern Xen VMI debugger. ARCHIVED: Development continues at https://github.com/spencermi…☆78Nov 2, 2020Updated 5 years ago
- A Rust malware controlled by a Go web interface, API and socket server.☆10Aug 22, 2022Updated 3 years ago
- Desktop Dashboard using ESP8266 and ILI9341 display☆11Jul 20, 2021Updated 4 years ago
- ☆15Oct 27, 2022Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆11Jan 8, 2023Updated 3 years ago
- Telegram-based PowerShell Runspace Host☆11Dec 8, 2022Updated 3 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- ☆13Oct 10, 2018Updated 7 years ago
- A streaming implementation of SipHash in C as well as an optimized one-pass implementation.☆27Nov 5, 2012Updated 13 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Código de @Cadibot en Telegram☆10Jan 11, 2026Updated last month
- ☆10Jun 26, 2024Updated last year
- ☆10Sep 20, 2020Updated 5 years ago
- Pentester's toolbox☆12Jan 21, 2026Updated last month
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- Simple code to resolve library functions at runtime☆10Jan 5, 2015Updated 11 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago