quarkslab / binmap
system scanner
☆218Updated 3 years ago
Alternatives and similar repositories for binmap
Users that are interested in binmap are comparing it to the libraries listed below
Sorting:
- Proof of Concept code for CVE-2016-5696☆101Updated 8 years ago
- The first open source vulnerability scanner for firmwares☆195Updated 8 years ago
- PyAna - Analyzing the Windows shellcode☆246Updated 9 years ago
- Hodor! Fuzzer..☆129Updated 8 years ago
- yet another tool for analysing binaries☆481Updated 2 months ago
- Offline debugger for malware's reverse engineering☆113Updated 10 years ago
- An evolutionary knowledge-based fuzzer☆271Updated last year
- Extended Differential Fuzzing Framework☆322Updated 7 years ago
- Certified Edible Dinosaurs official CTF toolkit☆121Updated 7 years ago
- A tool for checking exploitability☆209Updated 5 years ago
- fuzz☆125Updated 9 years ago
- Semantic Binary Code Analysis Framework☆124Updated 9 years ago
- Some tools to monitor BillGates CnC servers☆135Updated 11 years ago
- Run IDA Pro disassembler in Docker containers for automating, scaling and distributing the use of IDAPython scripts.☆290Updated 7 years ago
- The Multiplatform Linux Sandbox☆260Updated 3 years ago
- ☆137Updated 7 years ago
- GATEKEEPER: Inline and on-target defense☆120Updated 2 years ago
- A distributed fuzzing testing suite with web administration☆374Updated 6 years ago
- capstone based disassembler for extracting to binnavi☆228Updated 8 years ago
- Radare Congress Stuff☆207Updated 5 months ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆286Updated 8 years ago
- A tool to help you write binary exploits☆611Updated 6 years ago
- Linux bind shell with anti-reverse engineering techniques☆287Updated 8 years ago
- A tool to predict vulnerability discovery of binary only programs☆188Updated 7 years ago
- ☆85Updated 5 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆162Updated last week
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Updated 9 years ago
- Teach you a binary exploitation for great good.☆293Updated 6 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 8 years ago
- PEDA - Python Exploit Development Assistance for GDB☆97Updated 8 years ago