netspooky / protocols
☆229Updated last year
Alternatives and similar repositories for protocols:
Users that are interested in protocols are comparing it to the libraries listed below
- Binary Golf Grand Prix☆111Updated last year
- Binary Golf Examples and Resources☆251Updated 7 months ago
- Binary Protocol Differ☆117Updated 4 years ago
- ☆561Updated this week
- The xx file format. Turn your hex dumps into art, then into binary data.☆340Updated last year
- yxd - Yuu's heX Dumper☆89Updated 7 months ago
- A multi-arch assembly REPL and emulator for your command line.☆308Updated 2 months ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆241Updated 2 years ago
- Damn Vulnerable UEFI☆266Updated 5 months ago
- ☆38Updated 3 months ago
- PageBuster - dump all executable pages of packed processes.☆202Updated 3 years ago
- Code snippets for bare-metal malware development☆97Updated 2 years ago
- A Binary Genetic Traits Lexer Framework☆483Updated this week
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆87Updated 2 years ago
- Binary Golf Grand Prix☆50Updated 2 weeks ago
- A framework for creating smart cards (ICC-based cards with contacts).☆133Updated 6 months ago
- ☆128Updated 2 years ago
- Database of polyglot files. By polyglot, we mean files readable in multiple formats☆128Updated 6 years ago
- Execute ELF files without dropping them on disk☆490Updated 7 months ago
- A stealthy ELF loader - no files, no execve, no RWX☆159Updated last year
- NSA Codebreaker Challenge 2021 Write-Ups☆56Updated 3 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆144Updated 2 years ago
- Code Coverage Exploration Plugin for Ghidra☆338Updated 6 months ago
- Binary Golf Library☆63Updated 3 years ago
- Heap Exploitation Resources☆18Updated last year
- PCAP visualization tool☆103Updated last year
- Hiding messages in x86 programs using semantic duals☆294Updated this week
- ☆44Updated 3 years ago
- Writeup for the DEF CON 30 badge challenge☆69Updated 2 years ago
- Reverse engineering basics in puzzle form☆180Updated 4 years ago