pfalcon / ctopyLinks
Hacking on ESR's ctopy the C to Python conversion tool: http://www.catb.org/~esr/ctopy/
☆14Updated 13 years ago
Alternatives and similar repositories for ctopy
Users that are interested in ctopy are comparing it to the libraries listed below
Sorting:
- Translator from asm to C, but not decompiler. Something between compiler and decompiler.☆56Updated 4 years ago
- Regular expression Search on the command-line☆16Updated 7 months ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Updated 12 years ago
- Fetch and set configuration values from IDAPython scripts☆24Updated last week
- Python Application to Reverse Freezing☆36Updated 9 years ago
- Web based code browser using clang to provide basic code analysis.☆44Updated 8 years ago
- Symbol REPL☆31Updated 7 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Updated 7 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 8 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆10Updated 8 years ago
- An architecture plugin for binary ninja to disassemble raw python bytecode☆29Updated 7 years ago
- Solutions to crackmes☆19Updated 10 years ago
- Memory inspection REPL interface☆45Updated 8 years ago
- Tool to view heap chunks and memory writes (using pintool)☆42Updated 6 years ago
- CVE-2018-4330 POC for iOS☆17Updated 7 years ago
- Anything related to Ghidra☆12Updated 6 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 4 years ago
- A modified pycparser to parse 010 templates☆53Updated 5 years ago
- reverse engineering, visual binary analysis☆24Updated 8 years ago
- PyAsmJIT is a Python package for x86_64/ARM assembly code generation and execution.☆42Updated 5 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Updated 10 years ago
- ☆32Updated 9 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- A smart file fuzzer.☆26Updated 9 years ago
- SIGSTOPing ELF binaries since 0x7E1☆55Updated last year
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Intel PIN rocks☆15Updated 13 years ago