netspooky / protocols
☆229Updated last year
Alternatives and similar repositories for protocols:
Users that are interested in protocols are comparing it to the libraries listed below
- Binary Golf Grand Prix☆111Updated last year
- Binary Golf Examples and Resources☆253Updated 10 months ago
- yxd - Yuu's heX Dumper☆88Updated 10 months ago
- The xx file format. Turn your hex dumps into art, then into binary data.☆339Updated last year
- Binary Protocol Differ☆118Updated 4 years ago
- ☆605Updated last month
- PageBuster - dump all executable pages of packed processes.☆202Updated 4 years ago
- A multi-arch assembly REPL and emulator for your command line.☆310Updated 4 months ago
- NSA Codebreaker Challenge 2021 Write-Ups☆56Updated 3 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆87Updated 2 years ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆173Updated last year
- Decompilation as a Service. Explore multiple decompilers and compare their output with minimal effort. Upload binary, get decompilation.☆456Updated 2 years ago
- Utility to find hidden Linux kernel modules☆144Updated 4 months ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- A command line tool that resembles a debugger as well as Cheat Engine, to search for values in memory☆222Updated 2 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆145Updated 2 years ago
- A Binary Genetic Traits Lexer Framework☆490Updated 2 months ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆127Updated 2 years ago
- Damn Vulnerable UEFI☆274Updated 7 months ago
- Windows x64 handcrafted token stealing kernel-mode shellcode☆508Updated last year
- Binary Golf Grand Prix☆55Updated last month
- A framework for creating smart cards (ICC-based cards with contacts).☆132Updated 9 months ago
- Diff and display virtual machine snapshots☆236Updated 2 years ago
- ☆318Updated 10 months ago
- Intel Management Engine JTAG Proof of Concept☆142Updated 4 years ago
- ☆45Updated last month
- Hiding messages in x86 programs using semantic duals☆299Updated 2 weeks ago
- ☆77Updated 11 months ago
- Heap Exploitation Resources☆18Updated last year
- ☆128Updated 2 years ago