ncollisson / pointer-sequence-reversal
☆24Updated 7 years ago
Alternatives and similar repositories for pointer-sequence-reversal:
Users that are interested in pointer-sequence-reversal are comparing it to the libraries listed below
- ☆15Updated 4 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆50Updated 8 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆41Updated 11 years ago
- Ida Pro Ultimate Qt Build Guide☆26Updated 6 years ago
- ☆28Updated 7 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- ☆14Updated 9 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Updated 10 years ago
- IDAPython script in order to auto-rename subs☆20Updated 7 years ago
- IDASimulator is a plugin that extends IDA's conditional breakpoint support, making it easy to augment / replace complex executable code i…☆47Updated 10 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- IDAPython plugin for finding Xrefs from a function☆48Updated 8 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Updated 8 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆40Updated 7 years ago
- Private set of tools for game hacking☆12Updated 10 years ago
- Collection of scripts for radare2☆28Updated 6 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆56Updated 8 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 9 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- ☆33Updated 9 years ago
- ☆27Updated 3 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 10 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit using GDI☆18Updated 8 years ago
- IDApro idc and idapython script collection☆28Updated last year
- A pin tool to visualise heap operations☆21Updated 9 years ago
- ☆26Updated 8 years ago
- Uncategorized utilities☆56Updated 6 years ago
- A tiny hacking framework for the PwnAdventure3: Pwnie Island game created by http://ghostintheshellcode.com/ ( http://pwnadventure.com/ )☆26Updated 10 years ago
- Python module to detect, analyze and id application bugs☆21Updated last week