rsc-dev / pbd
Pbd is a Python module to disassemble serialized protocol buffers descriptors (https://developers.google.com/protocol-buffers/).
☆86Updated 4 years ago
Alternatives and similar repositories for pbd:
Users that are interested in pbd are comparing it to the libraries listed below
- Structured shrinking of unknown file formats☆96Updated 7 years ago
- Let your tests describe your program behavior☆62Updated 8 years ago
- ☆97Updated 7 years ago
- DHCP as a FUSE file system☆52Updated 9 years ago
- A pythonic wrapper over `atd` to schedule deletion of files/directories.☆53Updated 7 years ago
- Protocol detecting server library☆62Updated 4 years ago
- My little fuzzing framework inspired by grinder☆99Updated 7 years ago
- Programmable Dropbox for secure IoT☆70Updated 7 years ago
- Chair and the Key☆65Updated 9 years ago
- Describe C function prototypes in JSON.☆24Updated 9 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- A libre cross-platform disassembler.☆33Updated 7 years ago
- Snabb: simple and fast packet networking☆80Updated 5 years ago
- Totally Isolated TLS Unwrapping Server☆111Updated 4 years ago
- Data structure server.☆181Updated 8 years ago
- BloomFilter in python☆101Updated 7 years ago
- Statically linked Library detector☆70Updated 10 years ago
- A pythonic library to parse /proc/meminfo☆147Updated 4 years ago
- Ringbuffer-backed interactive data pipeline☆124Updated 9 years ago
- ☆64Updated 7 years ago
- A simple re-implementation of Google's sparsehash as a learning excercise.☆40Updated last year
- Wireshark-Specific Dissector Language☆197Updated 7 years ago
- Give pact several PIDs. When one PID dies, pact will kill all provided PIDs.☆190Updated 9 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆160Updated 11 months ago
- HTTP framework☆48Updated 7 years ago
- Module for enforcing language constraints in Python☆70Updated 2 years ago
- Just a simple radare2 Jupyter kernel☆110Updated 7 years ago
- Hash files, strings, input streams and network resources in various common algorithms simultaneously☆250Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- repeatedly run programs until they break, and be ready to attach a debugger☆193Updated 6 years ago