MD5 algorithm implementation - x86 assembler
☆25Mar 15, 2015Updated 10 years ago
Alternatives and similar repositories for rewolf-md5
Users that are interested in rewolf-md5 are comparing it to the libraries listed below
Sorting:
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Simple tool to bundle windows DLLs with PE executable☆117Mar 13, 2015Updated 10 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Mar 15, 2015Updated 10 years ago
- RC4 Encryption with CryptoAPI and C☆15Apr 6, 2016Updated 9 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- windows api hooking (user mode) sample☆21Jul 24, 2014Updated 11 years ago
- *DEPRECATED* Advanced skinning plugin for IDA Pro, ported to x64dbg☆32Nov 23, 2016Updated 9 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- A set of IDA Pro scripts to make Tree of Savior client reverse engineering easier☆17Dec 29, 2015Updated 10 years ago
- asp命令执行webshell☆19Oct 27, 2014Updated 11 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆22Oct 29, 2012Updated 13 years ago
- Redress Dissassembler is a cross platform binary disassembler written in Java with Capstone bindings☆24Mar 22, 2016Updated 9 years ago
- Java VM Operand Stack Viewer☆25Sep 11, 2015Updated 10 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- ☆15Jun 12, 2015Updated 10 years ago
- Simple anti-tamper embedded into a simple string encryption.☆10Mar 7, 2019Updated 6 years ago
- hexdumpmem is hexdump-like tool to dump memory and write memory. When developing a system on a SoC, I usually need to dump or write memor…☆11Jun 28, 2022Updated 3 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- Special IDA Pro tools for the Sega Genesis/Megadrive romhackers☆69Apr 29, 2021Updated 4 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆25Dec 19, 2020Updated 5 years ago
- ☆27Jul 29, 2013Updated 12 years ago
- Source code and sample exploits for the Stripe CTF Winter 2012☆45Mar 19, 2012Updated 13 years ago
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆10May 16, 2017Updated 8 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- Pascal interpreter for Android.☆23Sep 16, 2010Updated 15 years ago
- Java hex viewer component☆20Mar 4, 2011Updated 14 years ago
- Reversing Google Drive and other goodies ;)☆27Sep 26, 2013Updated 12 years ago
- Ossec cookbook for Chef, with secure & automated key management☆21Jun 13, 2013Updated 12 years ago
- Collection of my IDAPython scripts☆33Sep 17, 2015Updated 10 years ago
- Network Keylogger is an open source program that sends every key pressed in a computer to another computer, via TCP/IP. It can be used to…☆41Apr 25, 2011Updated 14 years ago
- A scriptable debugger library to interact with Android applications☆46Sep 27, 2013Updated 12 years ago
- ☆12Sep 2, 2017Updated 8 years ago
- ☆15Jan 14, 2016Updated 10 years ago