nccgroup / call_map
Current development for Call Map takes place at https://github.com/ajylee/call_map. Call Map is a tool for navigating Python call graphs.
☆28Updated 3 years ago
Alternatives and similar repositories for call_map:
Users that are interested in call_map are comparing it to the libraries listed below
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆24Updated 8 years ago
- Yara Plugin for Binary Ninja☆13Updated 7 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- ☆9Updated 7 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 9 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- ☆24Updated 9 years ago
- Collection of scripts for radare2☆28Updated 6 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Miscellaneous Tools☆38Updated 9 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 5 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- A virtual PDF analysis framework☆17Updated 11 years ago
- Memory awesomeness.☆29Updated 10 years ago
- Scapy hands-on at #GreHack16☆15Updated 8 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- Tools to work with vulnerability standards.☆19Updated 11 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Borrowed Instructions Synthetic Computation☆70Updated 10 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Updated 7 years ago
- Binary Analysis Platform☆73Updated 11 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 9 years ago
- Alternative hexdump.☆15Updated 9 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Updated 9 years ago
- ☆13Updated 7 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆13Updated 7 years ago
- strings for a Linux process' address space☆51Updated 11 years ago