High Level API on top of the R2Pipe interface
☆44Nov 15, 2025Updated 3 months ago
Alternatives and similar repositories for radare2-r2papi
Users that are interested in radare2-r2papi are comparing it to the libraries listed below
Sorting:
- ☆92Oct 24, 2018Updated 7 years ago
- Helps you to pull off a padding oracle attack.☆10Oct 29, 2018Updated 7 years ago
- RetDec disassembly syntax highlighting for Vim☆17Nov 6, 2023Updated 2 years ago
- An advanced memory forensics framework☆25Sep 25, 2014Updated 11 years ago
- Reference material for libbeauty☆25Aug 6, 2022Updated 3 years ago
- AI-powered web scraper for harvesting and analyzing Computing Research Association job listings.☆19Sep 14, 2024Updated last year
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆22Dec 14, 2018Updated 7 years ago
- ☆12Sep 13, 2023Updated 2 years ago
- Diaphora, a Free and Open Source program diffing tool☆23Aug 5, 2019Updated 6 years ago
- 🥇 Amazon Nova AI Challenge Winner - ASTRA emerged victorious as the top attacking team in Amazon's global AI safety competition, defeati…☆70Aug 14, 2025Updated 6 months ago
- ☆92Aug 18, 2024Updated last year
- OSS-Fuzz Public Corpora Crawler☆30Feb 23, 2023Updated 3 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Aug 19, 2018Updated 7 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Jan 10, 2019Updated 7 years ago
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆38May 11, 2020Updated 5 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Jan 27, 2025Updated last year
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last month
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Translate regular Assembly into Extended Instructions☆88Oct 9, 2012Updated 13 years ago
- Tools, documentation and scripts to move projects from IDA to R2 and viceversa☆136Oct 28, 2019Updated 6 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆74May 19, 2017Updated 8 years ago
- Random number rootkit for the Linux kernel☆28Mar 15, 2016Updated 9 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Jan 8, 2017Updated 9 years ago
- Build a project with Express.js☆11Jan 31, 2021Updated 5 years ago
- Cloud Mining automatically builds exploratory faceted search systems.☆52Oct 15, 2013Updated 12 years ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Aug 28, 2025Updated 6 months ago
- Akira Bot adalah Bot Whatsapp yg Memiliki 500+ Fitur, dan Menggunakan Bermacam² Rest Api☆10Apr 6, 2021Updated 4 years ago
- ☆13Aug 28, 2025Updated 6 months ago
- My personal profile!☆17Oct 25, 2024Updated last year
- This is a templated to be used for QRL Jacking Sessions (Tested on Chrome,brave & firefox )☆13Feb 26, 2022Updated 4 years ago
- GTA Car Tracker☆11Jan 21, 2023Updated 3 years ago
- Basic HTML & CSS Web Link Profile seperti Link Tree☆10Feb 27, 2023Updated 3 years ago
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- Workshop on Git for NTU Open Source Society☆12Oct 19, 2018Updated 7 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- ☆34Dec 3, 2016Updated 9 years ago
- Some kernel exploits☆146Nov 7, 2017Updated 8 years ago
- Malduino Elite firmware☆46May 31, 2017Updated 8 years ago
- CTF writeups☆42Feb 26, 2026Updated last week