steph3nsims / banned_functions
IDAPython script to check ELF & PE/COFF for MS SDL banned.h policy violations and set breakpoints.
☆35Updated last year
Alternatives and similar repositories for banned_functions:
Users that are interested in banned_functions are comparing it to the libraries listed below
- Personal repository for all ctf related stuffs☆67Updated 5 months ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆84Updated 4 years ago
- ☆113Updated 7 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆50Updated 7 years ago
- Fork of mona.py with x64dbg support☆103Updated 2 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- A Python tool to generate ROP chains☆63Updated 3 months ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Challenge for the 33C3 CTF☆15Updated 8 years ago
- Make ARM Shellcode Great Again☆62Updated 4 years ago
- VerSprite Security Research☆167Updated 2 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 7 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆86Updated last year
- ☆122Updated 7 years ago
- Unravels any libcs magic for your ret2libc exploit.☆80Updated 2 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆97Updated 12 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- WinHeap Explorer repository.☆119Updated 6 years ago
- ☆21Updated 7 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Updated 10 years ago