michalmalik / fce
☆19Updated 10 years ago
Alternatives and similar repositories for fce:
Users that are interested in fce are comparing it to the libraries listed below
- Naive Proof of Concept Crypter for GNU/Linux ELF64☆10Updated 7 years ago
- A console for assemble/disassemble code using capstone/keystone☆30Updated 6 years ago
- ROP based Movfuscator VM☆28Updated 8 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 6 years ago
- Collection of scripts for radare2☆28Updated 6 years ago
- python library for dumping a linux process from memory☆34Updated 14 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- WinDbg workplace settings that I use for debugging☆14Updated 7 years ago
- Python based angr plug in for IDA Pro.☆34Updated 7 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆10Updated 3 years ago
- ☆50Updated 7 years ago
- Diaphora, a Free and Open Source program diffing tool☆22Updated 5 years ago
- Patch a Windows PE (.exe, .dll, etc..) so it no longer loads with a random dynamic base. Saves changing breakpoint addresses between debu…☆15Updated 4 years ago
- Flare-On solutions☆36Updated 5 years ago
- A Unicorn based emulator to deobfuscate Equation Group string XOR obfuscation☆30Updated 6 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 5 years ago
- Configure SPI flash write protection.☆23Updated 4 years ago
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 6 years ago
- A repository of example plugins for Relyze Desktop.☆34Updated 4 years ago
- Fetch and set configuration values from IDAPython scripts☆20Updated 4 years ago
- Ghidra plugin to start an r2 webserver to let r2 interact with it☆47Updated 3 weeks ago
- Undefined Behaviour Snippets☆17Updated 7 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆52Updated 5 years ago
- ☆30Updated 9 years ago
- Binary Ninja plugin for ROP gadget calculation☆28Updated 5 years ago
- Translate regular Assembly into Extended Instructions☆86Updated 12 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 5 years ago
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆37Updated 4 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆34Updated 8 years ago
- sample linux x86_64 ELF virus☆53Updated 6 years ago