oleavr / ospyView external linksLinks
Automatically exported from code.google.com/p/ospy
☆98May 14, 2015Updated 10 years ago
Alternatives and similar repositories for ospy
Users that are interested in ospy are comparing it to the libraries listed below
Sorting:
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Jan 29, 2015Updated 11 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- ☆31May 10, 2016Updated 9 years ago
- XED based Disassembly Engine☆21Apr 23, 2018Updated 7 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Mar 1, 2016Updated 9 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- An SNMPv1, v2c and v3 dictionary attack tool. Please see: https://penturalabs.wordpress.com/2016/04/01/snmpplux/☆20Jun 29, 2016Updated 9 years ago
- The CrowdDetox plugin for Hex-Rays automatically removes junk code and variables from Hex-Rays function decompilations.☆162May 3, 2021Updated 4 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58May 28, 2017Updated 8 years ago
- Intercept arbitrary functions at run-time, without knowing their typedefs☆88Apr 13, 2017Updated 8 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Jan 23, 2022Updated 4 years ago
- FIX (Financial Information eXchange) protocol fuzzer☆24Jul 22, 2022Updated 3 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- ☆20Feb 22, 2021Updated 4 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- ☆10Jun 13, 2014Updated 11 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- ☆26Jun 23, 2016Updated 9 years ago
- [Deprecated] Painless code injection☆52Oct 8, 2014Updated 11 years ago
- ☆12Nov 3, 2020Updated 5 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- A proxy for encrypting TCP connections.☆11Mar 15, 2017Updated 8 years ago
- 整理统计MacOSX的安全补丁与修复的漏洞☆10May 23, 2016Updated 9 years ago
- PHP Vulnerability Hunter (fork)☆12May 8, 2015Updated 10 years ago
- Source code and tools of the former Mobile-Sandbox☆12Jan 4, 2019Updated 7 years ago
- Various things to share☆11Sep 22, 2018Updated 7 years ago
- ☆25Aug 10, 2018Updated 7 years ago
- idaemu is an IDA Pro Plugin - use for emulating code in IDA Pro.☆577Jun 29, 2022Updated 3 years ago
- A detours library for API hooking in C#☆33Jun 20, 2012Updated 13 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Aug 31, 2020Updated 5 years ago
- GNU Radio out-of-tree module for triggering on LTE signal☆14Apr 8, 2021Updated 4 years ago