strazzere / IDAnt-wannaView external linksLinks
ELF header abuse
☆50Mar 23, 2016Updated 9 years ago
Alternatives and similar repositories for IDAnt-wanna
Users that are interested in IDAnt-wanna are comparing it to the libraries listed below
Sorting:
- OS X tool for dumping IOKit hierarchies in DOT format.☆46Feb 7, 2016Updated 10 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 10 years ago
- ☆25Aug 10, 2018Updated 7 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆57Nov 29, 2016Updated 9 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- A command-line tool to apply or remove Apple Binary Protection from an application.☆51Apr 19, 2009Updated 16 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- Toolkit to detect/crash/attack GNU debugging-related tools☆153Apr 5, 2016Updated 9 years ago
- A Mach-O Load Command deobfuscator.☆43Nov 25, 2021Updated 4 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Mar 16, 2017Updated 8 years ago
- american fuzzy lop fuzzer from lcamtuf☆14Oct 31, 2014Updated 11 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- An OSX exploitation helper library.☆35Nov 29, 2015Updated 10 years ago
- A kernel extension to mitigate Gatekeeper bypasses☆49Nov 9, 2015Updated 10 years ago
- IDA Pro Plugins☆19May 31, 2015Updated 10 years ago
- Patch kextd using radare2☆16Apr 10, 2015Updated 10 years ago
- Tool to resolve symbols by the address of the binary☆15Sep 21, 2018Updated 7 years ago
- The power of posix_spawn in your shell.☆12Sep 18, 2022Updated 3 years ago
- meine kleine rop compiler, circa 2012☆70Aug 16, 2021Updated 4 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- iBoot64 Payload Development Toolkit☆42Jul 20, 2017Updated 8 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Oct 27, 2011Updated 14 years ago
- The best way to learn Frida, is practicing. This is an example of scripts to use in a practical workshop.☆28Jun 13, 2017Updated 8 years ago
- Dynamic malware analysis for the Android platform☆40Sep 26, 2014Updated 11 years ago
- Exploit code for CVE-2016-1757☆83Apr 27, 2016Updated 9 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Feb 9, 2018Updated 8 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 9 months ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated last year
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Identifies common functions in iBSS/iBEC/iBoot/LLB☆31Oct 26, 2015Updated 10 years ago
- An ELF parsing and manipulation library for Python☆74Oct 24, 2014Updated 11 years ago
- Small tool for disassembling shellcode (using objdump)☆149Jun 19, 2022Updated 3 years ago
- Google Project Zero OS X Vul Report Analysis☆32Apr 5, 2017Updated 8 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆17Jan 7, 2017Updated 9 years ago
- reverse engineering, visual binary analysis☆24Jan 9, 2017Updated 9 years ago