rwfpl / rewolf-md5
MD5 algorithm implementation - x86 assembler
☆25Updated 10 years ago
Alternatives and similar repositories for rewolf-md5:
Users that are interested in rewolf-md5 are comparing it to the libraries listed below
- Extremely simple but inefficient x86-64 assembly obfuscation.☆35Updated 9 years ago
- xLCB plugin for x64dbg☆20Updated 8 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- A wrapper for capstone for bearparser☆13Updated 2 years ago
- Ida Pro plugin that supports debugging with the anergistic spu emulator☆13Updated 9 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆27Updated 10 years ago
- IDA recompiler☆31Updated 10 years ago
- A collection of anti disassembly techniques☆18Updated 7 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆29Updated 8 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Updated 8 years ago
- Collection of IDA Pro/Hex-Rays configs, scripts, and plugins☆23Updated 5 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- Debugger for HTC phones bootloader (HBOOT).☆19Updated 11 years ago
- Plugin Manager for IDA Pro☆9Updated 9 years ago
- An application for obtaining, dumping and modifying token from user land.☆27Updated 9 years ago
- ☆13Updated 9 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Updated 4 years ago
- ☆11Updated 9 years ago
- Miscellaneous IDA scripts and projects☆13Updated 3 years ago
- ROP database plugin for IDA☆31Updated 6 years ago
- ☆33Updated 7 years ago
- ASProtect reverse engineering & analysis WinDbg extension☆22Updated 4 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆30Updated 9 years ago
- Shellcode tracer☆15Updated 8 years ago
- Executable File Viewer☆10Updated 8 years ago
- 🐧 A simple kernel-level rootkit☆20Updated 9 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Updated 12 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- IDA Pro Plugins☆19Updated 9 years ago
- Fetch and set configuration values from IDAPython scripts☆20Updated 4 years ago