steph3nsims / banned_functions
IDAPython script to check ELF & PE/COFF for MS SDL banned.h policy violations and set breakpoints.
☆35Updated 11 months ago
Alternatives and similar repositories for banned_functions:
Users that are interested in banned_functions are comparing it to the libraries listed below
- Personal repository for all ctf related stuffs☆68Updated 2 months ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- Fork of mona.py with x64dbg support☆99Updated 2 years ago
- Attacking the Core associated source files☆87Updated 7 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Updated 7 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago
- Collection of things made during my preparation to take on OSEE☆95Updated 5 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 6 years ago
- Manage building and deploying exploitation challenges with ease☆57Updated 2 months ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆82Updated 4 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆85Updated last year
- The Zulu fuzzer☆125Updated 7 years ago
- ☆122Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 6 years ago
- ☆88Updated 6 years ago
- ☆112Updated 7 years ago
- Helper scripts to assist penetration testing and exploit development☆36Updated last month
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆50Updated 6 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆23Updated 9 years ago
- VerSprite Security Research☆165Updated last year
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆61Updated 7 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆27Updated 7 years ago
- Unravels any libcs magic for your ret2libc exploit.☆80Updated 2 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆50Updated 8 years ago
- iOS Frida Scripts☆38Updated 7 years ago
- exploit for CVE-2018-4193☆70Updated 5 years ago