Same code , different CPU case , different build case , Iot bins reverse learning.
☆28Mar 8, 2017Updated 9 years ago
Alternatives and similar repositories for Reverse-bins
Users that are interested in Reverse-bins are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IDA7.6/IDA7.7/IDA8.1 + Python3 下,Go 在各常见 CPU架构(ARM/MIPS/x86/x64)下, ELF 文件的符号恢复脚本。已适配 Go1.2/Go1.16/Go1.18/Go1.20☆33Oct 12, 2024Updated last year
- Practice Go programming and implement CobaltStrike's Beacon in Go☆14Mar 19, 2020Updated 6 years ago
- 简单的Linux远程控制☆20Jun 3, 2017Updated 8 years ago
- simple VM crackme demo☆31Jul 13, 2016Updated 9 years ago
- Rizzo plugin ported to IDA 7.4+☆55Oct 12, 2024Updated last year
- 一个攻击框架☆10May 29, 2015Updated 10 years ago
- collection of links related to using and improving windbg☆20Jun 17, 2018Updated 7 years ago
- Docker kinsing malware bitcoin/xmr miner☆23Feb 18, 2021Updated 5 years ago
- lscan is a library identification tool on statically linked/stripped binaries☆408Dec 1, 2020Updated 5 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Mar 12, 2022Updated 4 years ago
- Shellcode Loader Engine for Windows☆27Jan 29, 2017Updated 9 years ago
- Malware Sinkhole List in various formats☆104Jul 6, 2022Updated 3 years ago
- Openssh backdoor found with a ssh honeypot☆27Jul 22, 2016Updated 9 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- Yet another IDA Pro real time syncing plugin☆16Mar 27, 2018Updated 7 years ago
- ☆11Dec 10, 2017Updated 8 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- A Ble Fingerprint Sniffer based on SDR.☆19May 13, 2020Updated 5 years ago
- ☆37Jul 10, 2015Updated 10 years ago
- Experiments on Linux Assembly shellcodes injection☆13Nov 21, 2017Updated 8 years ago
- 实验室工作实录,一个二导☆33Dec 18, 2022Updated 3 years ago
- My personal cheat sheet for the x64dbg python plugin.☆28Jun 6, 2020Updated 5 years ago
- IDA FLIRT Signature Database☆898Jun 27, 2022Updated 3 years ago
- Malware management program and tools☆28Dec 16, 2015Updated 10 years ago
- 自动化的渗透工具☆11Jul 8, 2013Updated 12 years ago
- A specific SSDP Scanner for the SSDP Attack Script☆11Sep 6, 2014Updated 11 years ago
- ☆11Jul 25, 2020Updated 5 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- AFL with QEMU 3.1.0 + optimizations (thread safe this time) from https://github.com/abiondo/afl☆10Mar 12, 2019Updated 7 years ago
- Security by EOS LIVE team.☆15Dec 24, 2018Updated 7 years ago
- Tensilica Xtensa Architecture Plugin and ESP8266 Firmware Loader for Binary Ninja☆18Apr 8, 2023Updated 2 years ago
- RISC-V Soft CPU Security Contest by Thales and Microchip Technology☆12Jul 29, 2019Updated 6 years ago
- Satori botnet variant☆13Mar 19, 2022Updated 4 years ago
- blog☆14Jan 1, 2020Updated 6 years ago
- some sploits☆19Sep 20, 2024Updated last year
- Simple commit search utility for Chromium Google Source.☆29Dec 8, 2022Updated 3 years ago
- Client/server code that impersonates TLS 1.3 to disguise C2 activity.☆73Jul 25, 2022Updated 3 years ago
- Zero-day vulnerabilities affecting Microsoft Exchange Server☆12Oct 4, 2022Updated 3 years ago
- Cross platform Windows PDB Reader for .NET Core to read windows pdb☆18Mar 14, 2020Updated 6 years ago