rem0obb / intel-8080
The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.
☆13Updated 2 years ago
Alternatives and similar repositories for intel-8080:
Users that are interested in intel-8080 are comparing it to the libraries listed below
- A simple multiplatform command line search tool for Windows API.☆44Updated last year
- Exploit development challenges!☆23Updated last year
- Repositório do Curso de Ghidra☆19Updated 4 years ago
- a cpp wrapper for ngrok☆8Updated 3 years ago
- Multiplatform CLI and GUI tool to show information about ELF files☆50Updated last year
- PE Injector - Inject code on 32-bit and 64-bit PE executables☆32Updated 3 years ago
- Conteúdo do treinamento/brainstorming Introdução a engenharia reversa no Windows feito com muito carinho por mim.☆14Updated 2 years ago
- ☆10Updated 6 years ago
- Open malware analysis / reversing database☆12Updated 3 years ago
- Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)☆8Updated 2 years ago
- A simple C program to demonstrate a Buffer Overflow.☆11Updated 3 years ago
- CLI program to calculate the entropy of files☆69Updated last year
- As the name maProc informs, it will map processes in linux, being able to check a process's stack/heap in User Land, being able to change…☆25Updated last year
- Capture newly created files on Windows☆64Updated 3 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 3 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆40Updated last month
- Stub for polymorphic code☆12Updated last year
- x86 OS development using Bochs emulator. MIT xv6, JamesM's kernel development tutorials (with some changes) & more☆80Updated last year
- Abusing exceptions for code execution.☆108Updated last year
- x86 and x64 assembly "read-eval-print loop" for Windows☆28Updated 7 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Updated 5 months ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆9Updated last year
- The most trivial virtual machine that can run a few x86 machine code instructions.☆27Updated 7 years ago
- A dynamic unpacking tool☆130Updated last year
- A simple tool made in Go dat try bypass 403 restrictions☆9Updated 4 years ago