nneonneo / ghidra-rickrollLinks
Get rickrolled, right in your favourite NSA reverse engineering tool
☆77Updated 2 years ago
Alternatives and similar repositories for ghidra-rickroll
Users that are interested in ghidra-rickroll are comparing it to the libraries listed below
Sorting:
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆176Updated 2 months ago
- Binary Golf Grand Prix☆115Updated 2 years ago
- XZ backdoor reverse engineering☆98Updated last year
- ☆30Updated 3 years ago
- Binary Golf Grand Prix☆71Updated last week
- A stealthy ELF loader - no files, no execve, no RWX☆169Updated last year
- python to tax form compiler☆12Updated 3 years ago
- Command-line & web tool for creating tweetable PNG-ZIP and PNG-JAR polyglot image files.☆37Updated 2 weeks ago
- Writing a self modifying program to play Bad Apple with it's control flow graph☆47Updated 4 years ago
- Memory manipulation library for Linux.☆28Updated 4 months ago
- ☆12Updated 2 years ago
- yxd - Yuu's heX Dumper☆90Updated last year
- A framework for creating smart cards (ICC-based cards with contacts).☆133Updated last year
- WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)☆48Updated 3 years ago
- Something with wine. I always wanted to try that out, but never had the time. Now I do.☆22Updated 2 years ago
- ☆40Updated last year
- Binary Golf Examples and Resources☆259Updated last week
- Detection and sanitization for Acropalypse Now - CVE-2023-21036☆82Updated 2 years ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- ☆90Updated 8 months ago
- Modern dark theme based on the original ghidra-dark☆151Updated 2 years ago
- Writeup of a remote code execution in Factorio by supplying a modified save file.☆88Updated last year
- Security Research☆39Updated 3 years ago
- playing with DDR DRAM bus fault injection☆92Updated last year
- ☆154Updated 2 months ago
- ☆27Updated 2 years ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆120Updated 3 months ago
- Ghidra scripts for recovering string definitions in Go binaries☆121Updated 11 months ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆113Updated 2 years ago
- Mark pre-Musk era Twitter actually verified accounts.☆115Updated 2 years ago