A little tool to execute functions without debugging an entire executable. Originally written by Gonzalo J. Carracedo (BatchDrake).
☆29Apr 6, 2014Updated 11 years ago
Alternatives and similar repositories for xnippet
Users that are interested in xnippet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of useful functions to write an exploit in OCaml☆17Oct 11, 2014Updated 11 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 11 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 11 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- cve2014-3153 exploit for ubuntu x86☆18Jan 24, 2015Updated 11 years ago
- ☆105Apr 20, 2015Updated 10 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Nov 28, 2013Updated 12 years ago
- Very simple runtime hooking library for OS X.☆15Aug 9, 2015Updated 10 years ago
- PEDA - Python Exploit Development Assistance for GDB☆19Nov 7, 2017Updated 8 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Semantic Binary Code Analysis Framework☆125Sep 28, 2015Updated 10 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- A fuzzing library that allows creating malicious payloads based on Joi validator schemas.☆14Apr 20, 2015Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- CTF exploit development and other tools of pwnage☆19May 30, 2019Updated 6 years ago
- An Android port of the general purpose honggfuzz fuzzer☆19Aug 20, 2015Updated 10 years ago
- Tools for IDA☆13May 25, 2016Updated 9 years ago
- Parsing MITRE EDR Evaluation results☆12Dec 5, 2018Updated 7 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Mar 30, 2015Updated 10 years ago
- ☆19Jan 24, 2016Updated 10 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- Visualization of heap operations.☆616Dec 5, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A single page for daily duty assignment☆12Jan 14, 2016Updated 10 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆57Nov 29, 2016Updated 9 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- Reference material for libbeauty☆25Aug 6, 2022Updated 3 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Jul 18, 2015Updated 10 years ago
- Dynamic IDA Enrichment☆476Mar 2, 2022Updated 4 years ago
- REIL translation library☆36May 6, 2016Updated 9 years ago
- Automated Return-Oriented Programming Chaining☆85Aug 30, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Virtual Security Module☆15Jul 1, 2021Updated 4 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Dec 20, 2025Updated 3 months ago
- A Retargettable CFI implementation in LLVM. Authors: Joseph Battaglia and Oulin Yao☆18May 8, 2015Updated 10 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- Exploits used on hacking CTF's☆28Sep 16, 2019Updated 6 years ago