☆48Nov 28, 2016Updated 9 years ago
Alternatives and similar repositories for fldbg
Users that are interested in fldbg are comparing it to the libraries listed below
Sorting:
- EM4x RFID Harvester using a Robotics Connection reader☆16Sep 27, 2012Updated 13 years ago
- ☆38Apr 24, 2019Updated 6 years ago
- gcc-arm-eabi-linaro-4.6.2☆26Apr 24, 2019Updated 6 years ago
- kali-sly-pi☆36Apr 24, 2019Updated 6 years ago
- Various Wireless Driver patches☆34Apr 24, 2019Updated 6 years ago
- Various Kali Scripts☆60Dec 20, 2016Updated 9 years ago
- Various Proxmark3 Mods☆58Sep 24, 2012Updated 13 years ago
- Kali Linux Windows App chroot builder script☆47Apr 24, 2019Updated 6 years ago
- Kali Linux u-boot images☆31Apr 24, 2019Updated 6 years ago
- ☆24Apr 25, 2019Updated 6 years ago
- gcc-arm-linux-gnueabihf-4.7/☆33Apr 24, 2019Updated 6 years ago
- Script to create Kali Linux Amazon Machine Images (AMIs)☆93Apr 24, 2019Updated 6 years ago
- ☆49Apr 24, 2019Updated 6 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Dec 28, 2016Updated 9 years ago
- Kali Linux NetHunter utils package☆113Apr 25, 2019Updated 6 years ago
- ☆39Mar 31, 2021Updated 4 years ago
- Automated Exploit generation with WinDBG☆190Oct 18, 2016Updated 9 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- FRAPL Framework☆152Dec 26, 2016Updated 9 years ago
- A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.☆188Apr 24, 2019Updated 6 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Jan 27, 2017Updated 9 years ago
- Reliable Teensy Penetration Testing Payload☆183Sep 17, 2012Updated 13 years ago
- x64 Windows Software Fault Injection Tool☆17Dec 2, 2017Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- HitCon 2016 Windows 10 x64 edge 0day and exploit☆109Jul 26, 2016Updated 9 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- Adobe Flash Player File Instrumentation Tool For Security Research☆86Sep 3, 2022Updated 3 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- ☆16Sep 7, 2017Updated 8 years ago
- ☆15Oct 27, 2015Updated 10 years ago
- REIL translation library☆36May 6, 2016Updated 9 years ago
- ☆26Jun 23, 2016Updated 9 years ago
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆38May 11, 2020Updated 5 years ago
- A project that aims to automatically devirtualize code that has been virtualized using x86virt☆126Dec 3, 2022Updated 3 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- SC2/HotS GalaxyScript VM & bytecode research☆26Oct 9, 2016Updated 9 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago