Experiments on C/C++ Exploits
☆22Jun 30, 2020Updated 5 years ago
Alternatives and similar repositories for C-Experiments
Users that are interested in C-Experiments are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A debugger / emulator for Ghidra☆14Oct 30, 2019Updated 6 years ago
- WizardsToolkit is a secure C library offering cross-platform cryptography, hashing, authentication, and data integrity tools. It supports…☆16Feb 16, 2026Updated last month
- Collection of various malware techniques aimed at Windows through MinGW☆16Aug 24, 2024Updated last year
- A simple flashable zip to switch between LineageOS and Sailfish OS boots☆11Dec 7, 2020Updated 5 years ago
- Portable PDB native support☆12Nov 24, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Reversing library based off sleigh from the Ghidra project. Pcode IR access, disassembly, C++17☆13Nov 12, 2021Updated 4 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 4 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆47Aug 27, 2020Updated 5 years ago
- Code profiler based on Frida☆32Mar 10, 2021Updated 5 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Jan 29, 2018Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Go package that aids in binary analysis and exploitation☆178Jul 17, 2021Updated 4 years ago
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Nov 18, 2019Updated 6 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆13Feb 6, 2023Updated 3 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Apr 10, 2021Updated 4 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- Corpus of crypto formats☆12Dec 2, 2022Updated 3 years ago
- Static instrumentation tool for efficient binary-level coverage analysis.☆152Jan 25, 2021Updated 5 years ago
- Windows driver uitls☆17Dec 8, 2014Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- CryptoWall 3.0 Ransomware Reversing Documentation & Scripts☆17Nov 24, 2020Updated 5 years ago
- Apply ROP protection to a binary using binary rewriting with GTIRB☆34Jul 1, 2025Updated 8 months ago
- Reads out structural information on Microsoft .exe formats☆43Jun 25, 2024Updated last year
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- This program exhibits the backdoor behaviour of PRNG Dual_Ec_Drbg☆52Dec 26, 2013Updated 12 years ago
- A simple DLL injection protection driver.☆12Dec 21, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Sources code extracted from malwares for analysis☆40Mar 10, 2023Updated 3 years ago
- Examples of the obfuscated APKs (using manifesto and/or other techniques)☆30Jan 9, 2015Updated 11 years ago
- ☆24Aug 30, 2019Updated 6 years ago
- fyyre.l2-fashion.de .. old site☆17Apr 27, 2022Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Aug 6, 2018Updated 7 years ago
- A tool to showcase the Therac-25 bugs☆12Jun 11, 2019Updated 6 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆39Sep 29, 2015Updated 10 years ago