quarkslab / wiregoLinks
☆44Updated last month
Alternatives and similar repositories for wirego
Users that are interested in wirego are comparing it to the libraries listed below
Sorting:
- ☆137Updated last year
- A library for intercepting system calls☆103Updated last year
- Ghidra scripts for recovering string definitions in Go binaries☆127Updated 2 months ago
- eBPF Memory Dump Tool☆99Updated 5 months ago
- eBPF hacks☆195Updated last year
- JA4TScan is an active TCP server fingerprinting tool.☆103Updated last year
- ELEGANTBOUNCER is a detection tool for file-based mobile exploits.☆171Updated 4 months ago
- io_uring based rootkit☆249Updated 9 months ago
- Binary Exploitation Phrack CTF Challenge☆140Updated 5 months ago
- Userland exec PoC to be used as attack vector technique☆94Updated 3 months ago
- Powershell Linter☆86Updated last month
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆127Updated 7 months ago
- A repo for TPM sniffing greatness☆245Updated last month
- ☆90Updated 11 months ago
- CLI tools: encoders/decoders, CTF and reverse engineering helpers.☆143Updated 3 months ago
- Linpmem is a linux memory acquisition tool☆95Updated 7 months ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆81Updated last week
- Binary Protocol Differ☆117Updated 5 years ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆209Updated 2 months ago
- Workshop on firmware reverse engineering☆356Updated 4 months ago
- ☆55Updated last year
- ☆76Updated 6 months ago
- A tool for firmware cartography☆165Updated 2 months ago
- PCAP visualization tool☆104Updated 2 years ago
- A stealthy ELF loader - no files, no execve, no RWX☆174Updated 2 years ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆59Updated 10 months ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆199Updated 2 years ago
- Slides and files for the Reversing Rust Binaries: One step beyond strings workshop at REcon 2024, presented on June 28, 2024.☆81Updated last year
- Opossum Attack: Application Layer Desynchronization using Opportunistic TLS☆15Updated 6 months ago
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆75Updated 10 months ago