radare / toysLinks
☆30Updated 7 years ago
Alternatives and similar repositories for toys
Users that are interested in toys are comparing it to the libraries listed below
Sorting:
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
- Ghidra plugin to communicate with radare2☆68Updated last month
- ld_preload userland rootkit☆35Updated 5 years ago
- Transforms any file into a protected ELF executable☆29Updated 10 years ago
- Intro to Assembly Optimization stream repo☆28Updated 4 years ago
- A console for assemble/disassemble code using capstone/keystone☆32Updated 7 years ago
- Launch radare2 like a boss from pwntools in tmux☆23Updated 6 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- ELF binary infector☆33Updated 14 years ago
- Collection of Linux shellcodes☆72Updated 9 years ago
- Notes on QEMU and Debian MIPS (big-endian)☆45Updated 7 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 7 months ago
- asrepl: x86-64 assembly REPL☆71Updated 8 years ago
- Experiments on C/C++ Exploits☆22Updated 5 years ago
- retools: a reverse engineering toolkit for normies☆87Updated 8 years ago
- Official archive of https://code.google.com/p/cryptospecs/☆77Updated 6 years ago
- ☆35Updated 13 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆41Updated 7 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- executing JS from x86 code☆27Updated 6 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- A Unicorn based emulator to deobfuscate Equation Group string XOR obfuscation☆33Updated 7 years ago
- ELF Virus infection techniques that work with SCOP (Secure code partitioned) executables☆15Updated 6 years ago
- Source codes for "The Antivirus Hackers Handbook" book.☆61Updated 10 years ago
- Small script to assemble/disassemble from CLI☆22Updated 3 years ago
- Library for Dissect and Infect ELF Binaries.☆40Updated 8 months ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆58Updated 4 years ago