Same code , different CPU case , different build case , Iot bins reverse learning.
☆28Mar 8, 2017Updated 9 years ago
Alternatives and similar repositories for Reverse-bins
Users that are interested in Reverse-bins are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An interactive mock C2 server☆17Feb 25, 2023Updated 3 years ago
- ☆17Nov 13, 2024Updated last year
- Practice Go programming and implement CobaltStrike's Beacon in Go☆14Mar 19, 2020Updated 6 years ago
- 简单的Linux远程控制☆20Jun 3, 2017Updated 8 years ago
- Rizzo plugin ported to IDA 7.4+☆55Oct 12, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 一个攻击框架☆10May 29, 2015Updated 10 years ago
- Load a statically-linked ELF binary(x86 architecture) without the execve syscall.☆45Sep 20, 2020Updated 5 years ago
- collection of links related to using and improving windbg☆20Jun 17, 2018Updated 7 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- lscan is a library identification tool on statically linked/stripped binaries☆408Dec 1, 2020Updated 5 years ago
- Shellcode Loader Engine for Windows☆27Jan 29, 2017Updated 9 years ago
- Malware Sinkhole List in various formats☆104Jul 6, 2022Updated 3 years ago
- Openssh backdoor found with a ssh honeypot☆27Jul 22, 2016Updated 9 years ago
- A simple PHP extension for hooking eval()☆17Feb 23, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆11Dec 10, 2017Updated 8 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- A Ble Fingerprint Sniffer based on SDR.☆19May 13, 2020Updated 5 years ago
- general framework for creating robots, worms, and backdoors☆11Nov 13, 2017Updated 8 years ago
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆62Jul 24, 2023Updated 2 years ago
- Experiments on Linux Assembly shellcodes injection☆13Nov 21, 2017Updated 8 years ago
- 实验室工作实录,一个二导☆33Dec 18, 2022Updated 3 years ago
- Repository of Volatility3 plugins☆22Mar 22, 2023Updated 3 years ago
- ☆16Oct 4, 2012Updated 13 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Dll注入/Hook/NtCreateThreadExProc/CreateRemoteThread☆14Jan 15, 2020Updated 6 years ago
- IDA FLIRT Signature Database☆900Jun 27, 2022Updated 3 years ago
- Malware management program and tools☆28Dec 16, 2015Updated 10 years ago
- 自动化的渗透工具☆11Jul 8, 2013Updated 12 years ago
- A specific SSDP Scanner for the SSDP Attack Script☆11Sep 6, 2014Updated 11 years ago
- ☆12Jul 25, 2020Updated 5 years ago
- AFL with QEMU 3.1.0 + optimizations (thread safe this time) from https://github.com/abiondo/afl☆10Mar 12, 2019Updated 7 years ago
- Security by EOS LIVE team.☆15Dec 24, 2018Updated 7 years ago
- Dataset of packed ELF samples