nashvail / Data-StructuresLinks
Includes implementation of common data structures along with specific algorithmic operations.
☆9Updated 9 years ago
Alternatives and similar repositories for Data-Structures
Users that are interested in Data-Structures are comparing it to the libraries listed below
Sorting:
- A python script that creates an X86 assembly code for memcpy using genetic algorithms.☆10Updated 5 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 8 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- ☆17Updated 6 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Updated 5 years ago
- Tiny research project to understand code injections on Linux based systems☆13Updated 7 years ago
- Simple VM-based scripting language☆13Updated 5 years ago
- Play 2048 in notepad.exe☆13Updated 10 years ago
- Executable File Viewer☆10Updated 8 years ago
- ☆12Updated 10 years ago
- ☆16Updated 7 years ago
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆9Updated 8 years ago
- Slack bot to assemble and disassemble using Capstone and Keystone☆11Updated 5 years ago
- Application Security library☆11Updated 12 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Decrypt the initial dropper of various exploit kits☆10Updated 7 years ago
- Exception detector for windows programs(x86 only)☆11Updated 8 years ago
- This repository is a clne of the new cuckoo monitor where I added some stuff to get the calling address for every hooked API☆8Updated 9 years ago
- A simple Windows driver which crashes the system and turns the BSOD pink☆19Updated 9 years ago
- Yet Another Repetitive Rootkit☆9Updated 12 years ago
- ☆11Updated 10 years ago
- ☆14Updated 7 years ago
- Shellcodes for different usecases☆9Updated 8 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 9 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- executing JS from x86 code☆27Updated 6 years ago
- Fuzzing Framework☆10Updated 7 years ago
- WinEoP Exploitation Framework☆24Updated 9 years ago