t00sh / perl-capstone
Perl wrapper for the capstone library
☆12Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for perl-capstone
- ☆26Updated 8 years ago
- ☆33Updated 9 years ago
- ☆28Updated 7 years ago
- ☆32Updated 7 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆69Updated 10 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 6 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 7 years ago
- Binary Analysis Platform☆73Updated 11 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Updated 10 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Updated 11 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆30Updated 7 years ago
- A console for assemble/disassemble code using capstone/keystone☆30Updated 6 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Updated 10 years ago
- Diaphora, a Free and Open Source program diffing tool☆22Updated 5 years ago
- r2yara - Module for Yara using radare2 information☆34Updated last year
- Using SEH to bypass CFG☆28Updated 7 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Updated 8 years ago
- Toy project for static analysis of ELF binaries☆30Updated 7 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 5 years ago
- Translate regular Assembly into Extended Instructions☆85Updated 12 years ago
- ☆47Updated 7 years ago
- A Python tool to generate ROP chains☆60Updated 6 years ago
- ☆22Updated 7 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 7 years ago
- Imports MSDN documentation into IDA Pro☆51Updated 12 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆37Updated 11 years ago