tintinweb / unboxLinks
unbox - Unpack and Decompile the $h*! out of things
☆47Updated 7 years ago
Alternatives and similar repositories for unbox
Users that are interested in unbox are comparing it to the libraries listed below
Sorting:
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆111Updated 6 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 7 months ago
- pyGoRE - Python library for analyzing Go binaries☆66Updated 3 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 9 years ago
- ☆36Updated 6 years ago
- Binary reversing tool to find all possible code paths between two functions.☆28Updated 7 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- A gentle introduction to binary exploitation☆42Updated 5 years ago
- ☆17Updated 4 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 6 years ago
- A plugin that adds a popup window to Binary Ninja that explains in simple English what an assembly instruction does☆52Updated 4 years ago
- ☆32Updated last year
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Brainfuck architecture module and loader for Binary Ninja☆20Updated 5 months ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆92Updated 6 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆91Updated 4 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆56Updated 6 years ago
- An architecture plugin for binary ninja to disassemble raw python bytecode☆29Updated 8 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Updated 11 years ago
- Experiments on C/C++ Exploits☆22Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- go reversing helpers for binaryninja☆31Updated 2 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Updated 6 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- bunch of random stuff☆21Updated 5 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆31Updated 5 years ago