nstarke / BaseAddressDiscovererererLinks
This tool bruteforces the file offset and base load address for a raw binary program file
☆15Updated last month
Alternatives and similar repositories for BaseAddressDiscoverererer
Users that are interested in BaseAddressDiscoverererer are comparing it to the libraries listed below
Sorting:
- ☆35Updated last year
- weggli ruleset scanner for source code and binaries☆37Updated 2 months ago
- Frida plugin for Binary Ninja☆21Updated last year
- Scripts from Ghidra Golf competitions☆34Updated 3 years ago
- BINARLY Research Tools and PoCs☆39Updated last year
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- A MBR Fuzzer☆31Updated last year
- SPI flash read MitM attack PoC☆40Updated 3 years ago
- ☆84Updated last year
- ☆25Updated 2 months ago
- Another™ MCP Server for Binary Ninja with superpower 🥵☆31Updated 8 months ago
- Diaphora Machine Learning tools and datasets☆23Updated last year
- nanoMIPS module for Ghidra☆54Updated 3 months ago
- LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers☆50Updated 5 months ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Python interface for Binexport, the Bindiff export format☆20Updated last month
- ☆14Updated 4 years ago
- Vulnerability research assistant that extracts pseudocode from the IDA Hex-Rays decompiler.☆99Updated last week
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- Binary Exploitation Phrack CTF Challenge☆70Updated 5 months ago
- ☆38Updated 3 years ago
- A tool to perform so called BGE attack☆26Updated 7 months ago
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆52Updated 4 months ago
- ☆21Updated 2 years ago
- ☆44Updated last year
- ☆24Updated last year
- OGhidra bridges Large Language Models (LLMs) via Ollama with the Ghidra reverse engineering platform, enabling AI-driven binary analysis …☆97Updated 2 weeks ago
- ☆30Updated 5 months ago
- Kernel Read Write Execute☆46Updated last year
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆55Updated 2 years ago