sunwxg / decode_by_libwiresharkLinks
☆18Updated 7 years ago
Alternatives and similar repositories for decode_by_libwireshark
Users that are interested in decode_by_libwireshark are comparing it to the libraries listed below
Sorting:
- 虚拟机带外内存监控☆14Updated 7 years ago
- JEB scripts for Golang executables analysis☆130Updated 6 years ago
- 基于行为的Ransomware检测原型☆40Updated 8 years ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20Updated 6 years ago
- ☆33Updated 9 years ago
- ☆18Updated 7 years ago
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆101Updated 4 years ago
- Experiment with Linux system calls (memfd_create, fexecve, fork...)☆24Updated 6 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Updated 7 years ago
- Find strings in Go binaries☆55Updated 6 years ago
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Updated 6 years ago
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆45Updated 2 years ago
- 一个基于 Qiling 的 函数仿真工具。可以从一个 ELF 文件中选取特定函数执行,并将执行结果导出。☆15Updated 3 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆45Updated 9 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 6 years ago
- ☆25Updated 7 years ago
- Joern Workshops☆29Updated 11 months ago
- ☆37Updated 10 years ago
- tool for building windows shellcode in C by MinGW☆54Updated 4 years ago
- A exe loader that can load NScript evaluation engine of Windows Defender/Microsft Security Essential. You can fuzz NScript by using this.…☆28Updated 8 years ago
- Shellcode Spider of Exploit-DB☆11Updated 8 years ago
- ☆34Updated 9 years ago
- IDA SIG files for multiarch uClibc library☆38Updated 7 years ago
- Code for diskless loading of ELF Shared Library using Reflective DLL Injection☆53Updated 9 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 6 years ago
- A dsniff project using bro☆11Updated 9 years ago
- Next generation !☆69Updated 4 years ago
- ☆10Updated 9 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆27Updated 2 years ago