mytechnotalent / 0x02-ARM-32-Hacking-Int
ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.
☆11Updated 3 years ago
Alternatives and similar repositories for 0x02-ARM-32-Hacking-Int:
Users that are interested in 0x02-ARM-32-Hacking-Int are comparing it to the libraries listed below
- ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.☆15Updated 3 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- Tools for analyzing Windows containers and break container's isolation☆29Updated 2 years ago
- DC540 hacking challenge 0x00005b.☆16Updated last year
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- My malware analysis code snippets☆27Updated last year
- From IoT Pentesting to IoT Security☆22Updated 6 years ago
- Patch a Windows PE (.exe, .dll, etc..) so it no longer loads with a random dynamic base. Saves changing breakpoint addresses between debu…☆15Updated 4 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆37Updated 11 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- Code snippets for Qiling Tutorials☆20Updated 4 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- ☆25Updated 2 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- Seven different DLL injection techniques in one single project.☆10Updated 4 years ago
- ☆28Updated 3 years ago
- frown (frida-own) – an instrumentation challenge☆24Updated last year
- ☆21Updated 4 years ago
- WinREPL is a "read-eval-print loop" shell on Windows that is useful for testing/learning x86 and x64 assembly.☆13Updated 2 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 5 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- The Multiplatform Linux Sandbox☆15Updated last year
- A Linux x86/x86-64 tool to trace registers and memory regions.☆37Updated 2 years ago
- ☆13Updated 4 years ago
- ARP Man-in-the-Middle tool☆29Updated 3 months ago
- github pages repository☆14Updated 3 weeks ago