puppykitten / lte
lte security
☆41Updated 9 years ago
Alternatives and similar repositories for lte:
Users that are interested in lte are comparing it to the libraries listed below
- Network and USB protocol fuzzing toolkit.☆35Updated 7 years ago
- Fuzzer☆43Updated 10 years ago
- XED based Disassembly Engine☆18Updated 6 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- Memory awesomeness.☆29Updated 9 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- Miscellaneous Tools☆38Updated 9 years ago
- ☆38Updated 9 years ago
- SIGSTOPing ELF binaries since 0x7E1☆52Updated 6 months ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Tools for analyzing hexagon code☆38Updated 8 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆73Updated 8 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 9 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆52Updated 10 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago
- ☆34Updated 8 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 6 years ago
- ARM rop chain gadget searcher☆37Updated 7 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆67Updated 9 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆67Updated 11 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Updated 8 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 7 years ago
- A TE executable format loader for IDA☆28Updated 9 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆41Updated 8 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- Slides, Papers, Links to CVEs and advisories☆78Updated 7 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 13 years ago
- ☆28Updated 2 years ago