rapid7 / rex-bin_tools
Created by David Maloney via the GitHub Connector
☆12Updated last month
Alternatives and similar repositories for rex-bin_tools:
Users that are interested in rex-bin_tools are comparing it to the libraries listed below
- r2yara - Module for Yara using radare2 information☆34Updated last year
- ☆20Updated 7 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 9 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 5 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- CTF Finals☆17Updated 7 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- ☆29Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 6 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆24Updated 6 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Updated 7 years ago
- public exploits☆35Updated last year
- A collection of shellcodes☆68Updated 12 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆25Updated 7 years ago
- Format string exploit generation☆10Updated 9 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- ☆10Updated 2 months ago
- Writeups for PicoCTF2017 Challenges☆10Updated 7 years ago