pmarkowsky / dash
A simple web based tool for working with assembly / disassembly
☆89Updated 5 months ago
Alternatives and similar repositories for dash:
Users that are interested in dash are comparing it to the libraries listed below
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- Hodor! Fuzzer..☆129Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆81Updated 8 years ago
- Semantic Binary Code Analysis Framework☆125Updated 9 years ago
- Slides and very basic examples☆111Updated 7 years ago
- A code gadget finder based on capstone/keystone/pyelftools☆92Updated 8 years ago
- ☆114Updated 7 years ago
- Statically linked Library detector☆70Updated 10 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 9 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 9 years ago
- Slides, Papers, Links to CVEs and advisories☆78Updated 7 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 7 years ago
- Multiple radare2 rpipe scripts☆61Updated 7 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- map file generator for intel x86 binary based on flirt signature☆84Updated 8 years ago
- An open source, multi-architecture ROP compiler written in python☆161Updated 7 years ago
- A place holder for Keystone repo. See https://github.com/keystone-engine/keystone for the real stuff☆67Updated 3 years ago
- SHURIKEN: Exploit throwing framework☆36Updated 9 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆92Updated 8 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 8 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 8 years ago
- Diary of a reverse-engineer☆39Updated 7 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 8 years ago
- PoC for CVE-2015-6086☆68Updated 9 years ago
- GATEKEEPER: Inline and on-target defense☆119Updated 2 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 7 years ago
- ☆48Updated 9 years ago