richo / unrubby
☆15Updated 8 years ago
Alternatives and similar repositories for unrubby:
Users that are interested in unrubby are comparing it to the libraries listed below
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆25Updated 9 years ago
- Bash integer overflow in braces☆11Updated 9 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- A little tool to execute functions without debugging an entire executable. Originally written by Gonzalo J. Carracedo (BatchDrake).☆29Updated 10 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Miscellaneous Tools☆38Updated 9 years ago
- SHURIKEN: Exploit throwing framework☆36Updated 9 years ago
- Precise Code Tracking (Vim)☆32Updated 8 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Updated 8 years ago
- INACTIVE - http://mzl.la/ghe-archive - Quokka is a utility to launch and monitor application for faults.☆40Updated 5 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- A TE executable format loader for IDA☆28Updated 9 years ago
- Memory awesomeness.☆29Updated 10 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Updated 5 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 9 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- POLAR☆73Updated 6 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 9 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆50Updated 9 years ago
- ☆45Updated 7 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 7 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24Updated 4 years ago
- Wrap radamsa on OSX, add instrumentation / triage.☆15Updated 8 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Updated 7 years ago