tintinweb / unboxLinks
unbox - Unpack and Decompile the $h*! out of things
☆47Updated 7 years ago
Alternatives and similar repositories for unbox
Users that are interested in unbox are comparing it to the libraries listed below
Sorting:
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago
- ☆36Updated 6 years ago
- pyGoRE - Python library for analyzing Go binaries☆66Updated 3 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 9 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆111Updated 6 years ago
- Extract annoations from Ghidra into an X32/X64 dbg database☆57Updated 4 years ago
- A gentle introduction to binary exploitation☆42Updated 5 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆56Updated 6 years ago
- Experiments on C/C++ Exploits☆22Updated 5 years ago
- ☆13Updated 9 years ago
- Binary reversing tool to find all possible code paths between two functions.☆28Updated 7 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 6 months ago
- Brainfuck architecture module and loader for Binary Ninja☆20Updated 5 months ago
- bunch of random stuff☆21Updated 5 years ago
- Linux-KVM with rVMI extensions☆22Updated 8 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- ☆65Updated 9 years ago
- Miscellanous scripts used for malware analysis☆23Updated 7 years ago
- It is demonstration tool that contains collection techniques to detect the virtualisation environment in Linux Operating System.☆22Updated 7 years ago
- Flare-On solutions☆37Updated 6 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 4 years ago
- ☆32Updated last year
- ☆17Updated 7 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Updated 6 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Updated 11 years ago
- Minimal DLL-injection tool.☆37Updated 9 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- An architecture plugin for binary ninja to disassemble raw python bytecode☆29Updated 8 years ago