netspooky / pdiffLinks
Binary Protocol Differ
☆119Updated 5 years ago
Alternatives and similar repositories for pdiff
Users that are interested in pdiff are comparing it to the libraries listed below
Sorting:
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- a pstree mod that prints other helpful information and with added functionality☆25Updated 5 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- Binary Golf Library☆62Updated 4 years ago
- yxd - Yuu's heX Dumper☆90Updated last year
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- PageBuster - dump all executable pages of packed processes.☆204Updated 4 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 5 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆96Updated 5 months ago
- ☆231Updated 2 years ago
- a friendly wrapper around ptrace☆133Updated 3 years ago
- ☆37Updated 4 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆59Updated 3 years ago
- A port of Kaitai to the Hiew hex editor☆150Updated 5 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 4 years ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- A novel technique to hide code from debuggers & disassemblers☆159Updated last year
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- (Linux Kernel) Stack Monitoring Tool☆47Updated 3 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Material for a RE 101 class on Intel x64 binaries☆164Updated 5 years ago
- Reverse Engineering tools, scripts, and general commentary☆59Updated 6 years ago
- Simple tool to graph files for quick analysis☆57Updated last year
- An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't ca…☆203Updated 3 years ago
- Exploiting Linksys WRT54G using a vulnerability I found.☆36Updated 4 years ago
- iTLB multihit PoC☆42Updated 2 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆55Updated 8 years ago
- ☆36Updated 4 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆207Updated 6 months ago
- General Research Repository - Only updated when I feel like it☆28Updated last year