nccgroup / call_mapLinks
Current development for Call Map takes place at https://github.com/ajylee/call_map. Call Map is a tool for navigating Python call graphs.
☆29Updated 4 years ago
Alternatives and similar repositories for call_map
Users that are interested in call_map are comparing it to the libraries listed below
Sorting:
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆34Updated last year
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆25Updated 9 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Tools to work with vulnerability standards.☆19Updated 11 years ago
- Yara Plugin for Binary Ninja☆13Updated 7 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 11 years ago
- ☆25Updated 10 years ago
- Collection of scripts for radare2☆27Updated 7 years ago
- strings for a Linux process' address space☆51Updated 12 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Updated 8 years ago
- Some yara rules and tools☆16Updated 11 years ago
- Memory awesomeness.☆29Updated 10 years ago
- A virtual PDF analysis framework☆17Updated 11 years ago
- Parallel APK analyzer☆51Updated 9 years ago
- Process heap analysis framework - Windows/Linux - record type inference and forensics☆95Updated 8 years ago
- ActionScript ByteCode Disassembler☆16Updated 10 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38Updated 7 years ago
- Fuzzing things with afl and python-afl☆59Updated 9 years ago
- A Simple Network Stream Recorder☆35Updated 6 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Updated 10 years ago
- Memory forensics of virtualization environments☆48Updated 11 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- Graphical analysis of PDF structure.☆12Updated 9 years ago
- Binary Analysis Platform☆74Updated 12 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 11 years ago
- Write Up I write for different CTFs☆12Updated 8 years ago
- Recon system hardening scanner☆47Updated 9 years ago
- Dig through Git commits and logs☆21Updated 7 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 9 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Updated 8 years ago