PENGUIN (Personalized EmulatioN Generated Using Instrumented Analysis) takes a target centric approach to rehosting using a precise and tailored specification of the rehosting process
☆54Mar 19, 2026Updated this week
Alternatives and similar repositories for penguin
Users that are interested in penguin are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Identify and extract files from container formats using unblob.☆26Nov 19, 2024Updated last year
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated last month
- Adds back the /scores JSON API for ctftime.org☆13Aug 22, 2023Updated 2 years ago
- DrayTek Vigor165 stuff☆12Oct 30, 2020Updated 5 years ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆37Jan 2, 2025Updated last year
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 5 months ago
- Pushbullet notifications channel for Laravel☆14Jun 19, 2024Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆30Oct 16, 2025Updated 5 months ago
- ☆21Aug 20, 2025Updated 7 months ago
- self-hosted Azure OSINT tool☆34Jun 24, 2025Updated 9 months ago
- Patching framework for Xtensa based Qualcomm Wifi chips☆13Aug 7, 2023Updated 2 years ago
- iOS: Make keyboard show current case.☆22Nov 15, 2014Updated 11 years ago
- ARVO: an Atlas of Reproducible Vulnerabilities in Open source software.☆65Feb 16, 2026Updated last month
- ☆96May 4, 2025Updated 10 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆97Feb 3, 2026Updated last month
- Implementation of the NDSS'24 paper "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing"☆20Sep 7, 2023Updated 2 years ago
- ☆35Nov 16, 2023Updated 2 years ago
- This is a very simple and (hopefully) useful way to cheaply and quickly hold KIK lock cylinders in setting such as lockpick villages, sch…☆23Nov 10, 2022Updated 3 years ago
- MediaTek MD32 processor module for Ghidra.☆16Apr 10, 2024Updated last year
- Output high level Pcode (PcodeAST) in Ghidra☆16Apr 7, 2023Updated 2 years ago
- A toolkit for conducting multiple static binary analysis based on Ghidra.☆24May 1, 2025Updated 10 months ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆141Oct 14, 2023Updated 2 years ago
- Fuzz everything! Now let's fuzz chip!☆35Feb 11, 2026Updated last month
- 33C3 CTF binary challenge☆27Jan 6, 2017Updated 9 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Feb 13, 2019Updated 7 years ago
- Rizin Signature Database (Source)☆17Aug 23, 2023Updated 2 years ago
- ☆73Nov 1, 2023Updated 2 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆64Oct 14, 2023Updated 2 years ago
- ☆10May 25, 2023Updated 2 years ago
- ☆11May 13, 2024Updated last year
- binary ninja cli for agents☆60Mar 14, 2026Updated last week
- A loader and analyzer for ESP8266 firmware☆15Feb 20, 2026Updated last month
- Minidump loader for Binary Ninja☆15Sep 25, 2025Updated 6 months ago
- SCEP request tool for AD CS and Intune☆74Oct 24, 2025Updated 5 months ago
- FluxN0de☆15Feb 22, 2022Updated 4 years ago
- Tool to create TODO tasks from Telegram messages in one tap☆21May 23, 2025Updated 10 months ago