utilities
☆15Jul 2, 2013Updated 12 years ago
Alternatives and similar repositories for shellcodes
Users that are interested in shellcodes are comparing it to the libraries listed below
Sorting:
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- "HeaderScan" Burp Plugin☆16Apr 26, 2014Updated 11 years ago
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- Tools made for Tizen Security Analysis☆14Jun 2, 2015Updated 10 years ago
- Very simple runtime hooking library for OS X.☆15Aug 9, 2015Updated 10 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Apr 14, 2016Updated 9 years ago
- Practice and learning in the world of C RE and exploit analysis☆33Feb 2, 2018Updated 8 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆24Apr 10, 2013Updated 12 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- DbgScript is a multi-script dbgeng (WinDbg, cdb, ntsd) extension. Use Python, Ruby or Lua to analyze data structures, or BYO provider.☆23Aug 15, 2016Updated 9 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- A collection of tools for overwriting the MBR (Master Boot Record) of a machine with another file.☆20Apr 15, 2014Updated 11 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- Introduce you to shellcode development.☆23Jun 8, 2016Updated 9 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- network pcap fuzzer☆21Jan 19, 2015Updated 11 years ago
- Some slides from some presentations I have given☆25Jan 2, 2016Updated 10 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- IDA AArch64 processor extender extension: Adding crypto extension instructions (AES/SHA1/SHA256)☆24Nov 26, 2016Updated 9 years ago
- Penetration testing on windows(7 or 8)☆25Oct 21, 2020Updated 5 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Dec 9, 2015Updated 10 years ago
- Collection of Praetorian solutions to CTF challenges☆25Apr 20, 2018Updated 7 years ago
- swffile.py - SWF file parser module in Python☆28Apr 4, 2016Updated 9 years ago
- IDAPython script for quick vulnerability analysis☆32May 10, 2014Updated 11 years ago
- ☆24Feb 21, 2016Updated 10 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Z3 Symbolic Execution python☆28Dec 28, 2017Updated 8 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago