nneonneo / ghidra-rickrollLinks
Get rickrolled, right in your favourite NSA reverse engineering tool
β77Updated 2 years ago
Alternatives and similar repositories for ghidra-rickroll
Users that are interested in ghidra-rickroll are comparing it to the libraries listed below
Sorting:
- π€© Emoji shellcoding tools for RISC-V (32-bit and 64-bit)β176Updated 3 months ago
- A stealthy ELF loader - no files, no execve, no RWXβ170Updated last year
- WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)β49Updated 3 years ago
- Binary Golf Grand Prixβ74Updated 3 weeks ago
- Memory manipulation library for Linux.β28Updated 5 months ago
- yxd - Yuu's heX Dumperβ90Updated last year
- Binary Golf Grand Prixβ115Updated 2 years ago
- β30Updated 3 years ago
- Writing a self modifying program to play Bad Apple with it's control flow graphβ47Updated 4 years ago
- python to tax form compilerβ12Updated 3 years ago
- Command-line & web tool for creating tweetable PNG-ZIP and PNG-JAR polyglot image files.β37Updated last month
- XZ backdoor reverse engineeringβ98Updated last year
- Binary Golf Examples and Resourcesβ258Updated 3 weeks ago
- playing with DDR DRAM bus fault injectionβ92Updated last year
- Something with wine. I always wanted to try that out, but never had the time. Now I do.β22Updated 2 years ago
- β12Updated 3 years ago
- Damn Vulnerable UEFIβ293Updated last year
- Modern exploit in Golang for ancient Nagra / Dish Network cards.β30Updated 9 months ago
- WMI virus, because funnyβ296Updated 9 months ago
- Windows 10 (32-bit) temporary watermark remover.β53Updated 3 years ago
- iPhone 15 compatible firmware for the central scrutinizer.β48Updated 2 years ago
- A PNG file-smuggling tool and library!β25Updated 2 years ago
- The xx file format. Turn your hex dumps into art, then into binary data.β345Updated 2 years ago
- β50Updated last year
- β90Updated 9 months ago
- Modern dark theme based on the original ghidra-darkβ154Updated 2 years ago
- Experiments, snippets and other things related to Binary Ninjaβ17Updated last year
- An exploit for Faronics DeepFreeze 8.38.220.5256 that uses SEH overflow, a custom ROP chain, and a two-phase encryption bypass to achieveβ¦β20Updated 11 months ago
- Apple Silicon to Apple Silicon VDM utilityβ52Updated 2 years ago
- An exploit chain for the Magic Leap One (and probably other TX2 devices)β69Updated 6 months ago