Ruby plugin for IDAPro
☆25Dec 5, 2011Updated 14 years ago
Alternatives and similar repositories for idarub
Users that are interested in idarub are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- crabstone is a Ruby binding to the capstone disassembly library by Nguyen Anh Quynh☆19Aug 4, 2024Updated last year
- Tool to analyze 64-bit binaries with 32-bit Hex-Rays Decompiler☆79Jan 11, 2015Updated 11 years ago
- Some slides from some presentations I have given☆25Jan 2, 2016Updated 10 years ago
- ☆14Aug 12, 2015Updated 10 years ago
- Tools for reverse engineering the Utimaco Firmware☆43Jan 24, 2017Updated 9 years ago
- Reexport symbols for Mach-O and ELF☆38Mar 2, 2018Updated 8 years ago
- A Ruby DSL for crafting SQL Injections☆46Jan 12, 2026Updated 2 months ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆94Dec 23, 2025Updated 3 months ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 5 months ago
- Created by David Maloney via the GitHub Connector☆12Jul 10, 2025Updated 8 months ago
- Objective-C Trace Tools for iOS and macOS☆20Jan 19, 2020Updated 6 years ago
- Archive of Metasploit Framework v3 (Pre-Rapid7)☆10Aug 24, 2014Updated 11 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- A fork of AFL for fuzzing Windows binaries☆23May 3, 2018Updated 7 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- A common database library for managing and querying security data☆18Jan 12, 2026Updated 2 months ago
- A debugger backend for IDA Pro built on top of of Intel’s PIN framework☆35Feb 17, 2024Updated 2 years ago
- Python module wrapping Bindiff usage into a Python API.☆22Jan 20, 2026Updated 2 months ago
- Set of Minimal C Utilities☆16Aug 21, 2015Updated 10 years ago
- A simple DLL injector written in Golang☆16Aug 9, 2025Updated 7 months ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- Code injection + payload communications for OSX (incl. sandboxed apps)☆24Sep 24, 2014Updated 11 years ago
- The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.☆13Mar 17, 2024Updated 2 years ago
- ☆14Apr 6, 2025Updated 11 months ago
- Parsec-like parser combinators for Crystal☆17Nov 17, 2022Updated 3 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- IDA AArch64 processor extender extension: Adding crypto extension instructions (AES/SHA1/SHA256)☆24Nov 26, 2016Updated 9 years ago
- ROP database plugin for IDA☆32Jun 5, 2018Updated 7 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- libopcodes-based disassembler☆35Aug 8, 2020Updated 5 years ago
- Use security tools from within IRC.☆24Mar 20, 2012Updated 14 years ago
- IDA loader for Apple SecureROM☆13Sep 29, 2019Updated 6 years ago
- ☆21Sep 13, 2022Updated 3 years ago
- The ronin-rb.dev website☆24Jan 12, 2026Updated 2 months ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Rex library for text generation and manipulation☆21Apr 9, 2025Updated 11 months ago