Experiments on C/C++ Exploits
☆22Jun 30, 2020Updated 5 years ago
Alternatives and similar repositories for C-Experiments
Users that are interested in C-Experiments are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A debugger / emulator for Ghidra☆14Oct 30, 2019Updated 6 years ago
- WizardsToolkit is a secure C library offering cross-platform cryptography, hashing, authentication, and data integrity tools. It supports…☆16Feb 16, 2026Updated last month
- Collection of various malware techniques aimed at Windows through MinGW☆16Aug 24, 2024Updated last year
- Portable PDB native support☆12Nov 24, 2023Updated 2 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Easy sandboxing for rust☆12Jun 19, 2016Updated 9 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆13Mar 3, 2022Updated 4 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Code profiler based on Frida☆32Mar 10, 2021Updated 5 years ago
- Go package that aids in binary analysis and exploitation☆179Jul 17, 2021Updated 4 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 7 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆14Feb 6, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆32Apr 10, 2021Updated 5 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- an iSCSI demo driver for Windows☆12Sep 21, 2015Updated 10 years ago
- Static instrumentation tool for efficient binary-level coverage analysis.☆152Jan 25, 2021Updated 5 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- CryptoWall 3.0 Ransomware Reversing Documentation & Scripts☆17Nov 24, 2020Updated 5 years ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 6 years ago
- This program exhibits the backdoor behaviour of PRNG Dual_Ec_Drbg☆52Dec 26, 2013Updated 12 years ago
- A simple DLL injection protection driver.☆12Dec 21, 2020Updated 5 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 9 months ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53May 1, 2014Updated 11 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Examples of the obfuscated APKs (using manifesto and/or other techniques)☆30Jan 9, 2015Updated 11 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆24Aug 30, 2019Updated 6 years ago
- A tool to showcase the Therac-25 bugs☆12Jun 11, 2019Updated 6 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆38Sep 29, 2015Updated 10 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆35Nov 18, 2020Updated 5 years ago
- ☆13Feb 16, 2016Updated 10 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 8 years ago
- Remote Assistance Volatile Environment LPE☆15Jun 28, 2025Updated 9 months ago