nashvail / Data-Structures
Includes implementation of common data structures along with specific algorithmic operations.
☆9Updated 9 years ago
Alternatives and similar repositories for Data-Structures:
Users that are interested in Data-Structures are comparing it to the libraries listed below
- collection of scripts and stuff☆12Updated 8 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- ☆17Updated 6 years ago
- Injectable Windows DLL which enforces a W^X memory policy on a process☆14Updated 7 years ago
- CryptoGuy is a tool usefull to find out various decryptions of a string☆25Updated 9 years ago
- Tiny research project to understand code injections on Linux based systems☆13Updated 7 years ago
- ☆12Updated 9 years ago
- Slack bot to assemble and disassemble using Capstone and Keystone☆11Updated 5 years ago
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆9Updated 7 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- wow64 syscall filter☆13Updated 10 years ago
- Simple VM-based scripting language☆13Updated 4 years ago
- Malware monitor template based on MinHook☆16Updated 9 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Updated 6 years ago
- Decrypt the initial dropper of various exploit kits☆10Updated 7 years ago
- Static analysis tools for x86 assembly☆13Updated 7 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆10Updated 9 years ago
- This repository is a clne of the new cuckoo monitor where I added some stuff to get the calling address for every hooked API☆8Updated 8 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 9 years ago
- lkm rootkit☆15Updated 10 years ago
- This is a very simple Keylogger, it doesn't hide itself and is a college project building towards developing a rootkit.☆21Updated 10 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 4 years ago
- File antivirus☆10Updated 5 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- PE32 binary + W32 payload☆12Updated 7 years ago
- IDA plugin for software reverse-engineering and visualization.☆7Updated 8 years ago
- Continuation of the popular patchdiff IDA plugin☆10Updated 10 years ago
- ☆12Updated 7 years ago
- A python script that creates an X86 assembly code for memcpy using genetic algorithms.☆10Updated 5 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 10 years ago