steph3nsims / banned_functionsView external linksLinks
IDAPython script to check ELF & PE/COFF for MS SDL banned.h policy violations and set breakpoints.
☆36Feb 11, 2024Updated 2 years ago
Alternatives and similar repositories for banned_functions
Users that are interested in banned_functions are comparing it to the libraries listed below
Sorting:
- An Interactive Pcap Editor (based on Scapy)☆23Oct 11, 2020Updated 5 years ago
- Remote kernel exploit for ROSE amateur radio☆24Aug 8, 2011Updated 14 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- Yet another dynamic routine hooking library for OS X. Uses Mach exception handlers.☆11Feb 7, 2016Updated 10 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- Laniakea is a utility for managing instances at various cloud providers and aids in setting up a fuzzing cluster.☆27Jun 1, 2021Updated 4 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 6 years ago
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 10 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 2 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- IDA Python Scripts☆46Jul 19, 2009Updated 16 years ago
- Full functional idascript with stdin/stdout handled☆20Jan 25, 2017Updated 9 years ago
- Intel PIN rocks☆15Jun 5, 2012Updated 13 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 7 years ago
- A prototype system call fuzzer.☆14Apr 16, 2017Updated 8 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 2 months ago
- Wordpress Two-factor Authentication Brute-forcer☆19Oct 22, 2019Updated 6 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- ☆27Sep 4, 2017Updated 8 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- CFURL Cache inspector for Burp Suite☆18Dec 8, 2020Updated 5 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Jan 17, 2022Updated 4 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- IDA plugin to extract Mach-O binaries located in the disassembly or data☆60Jun 15, 2019Updated 6 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Feb 11, 2024Updated 2 years ago
- ☆44Aug 9, 2017Updated 8 years ago
- This contains Helpful PYKD (Python Extension for Windbg) scripts☆49Mar 9, 2015Updated 10 years ago
- The repository accompanying the Buer Emulation workshop☆23Aug 18, 2021Updated 4 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- CTF Writeups☆26Oct 6, 2019Updated 6 years ago
- Valgrind extension for whitebox fuzz testing☆30Jul 10, 2009Updated 16 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Some slides from some presentations I have given☆25Jan 2, 2016Updated 10 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago