nccgroup / call_mapLinks
Current development for Call Map takes place at https://github.com/ajylee/call_map. Call Map is a tool for navigating Python call graphs.
☆28Updated 3 years ago
Alternatives and similar repositories for call_map
Users that are interested in call_map are comparing it to the libraries listed below
Sorting:
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- ☆9Updated 7 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- Fuzzing things with afl and python-afl☆59Updated 8 years ago
- ☆24Updated 9 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆24Updated 8 years ago
- A developer-friendly framework for exhaustive analysis of (PCAP and PE) files.☆15Updated 7 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Collection of scripts for radare2☆28Updated 6 years ago
- Yara Plugin for Binary Ninja☆13Updated 7 years ago
- first commit☆20Updated last year
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- Easily write tests and fuzz many different programs.☆12Updated 2 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Alternative hexdump.☆15Updated 9 years ago
- Miscellaneous Tools☆38Updated 9 years ago
- Inspect your builds to look for changes in filesystem, network traffic and running processes.☆13Updated 6 years ago
- ☆17Updated 7 years ago
- A List of InfoSec Resources☆10Updated 10 years ago
- strings for a Linux process' address space☆51Updated 11 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- ☆27Updated 8 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago
- Repository for proxenet plugins☆14Updated 8 years ago
- Passive Bitcoin Project☆10Updated 9 years ago