tintinweb / unbox
unbox - Unpack and Decompile the $h*! out of things
☆47Updated 6 years ago
Alternatives and similar repositories for unbox:
Users that are interested in unbox are comparing it to the libraries listed below
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- Arcane Sector game - a CTF task, or old-school (MMO)RPG - depending on the perspective. The code is of terrible quality, you have been w…☆29Updated 5 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆31Updated 4 years ago
- ☆12Updated 8 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆49Updated 2 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆32Updated 6 years ago
- ☆45Updated 6 years ago
- [F]aster [U]niversal [U]npacker☆46Updated 11 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- Brainfuck architecture module and loader for Binary Ninja☆15Updated 3 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆48Updated 3 years ago
- ☆32Updated 7 months ago
- Plugin for Frida in Binary Ninja☆27Updated 3 years ago
- ☆17Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- An architecture plugin for binary ninja to disassemble raw python bytecode☆29Updated 7 years ago
- ☆36Updated 5 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆52Updated 5 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- Extract annoations from Ghidra into an X32/X64 dbg database☆57Updated 3 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆87Updated 3 years ago
- Notes about reverse engineering the Petya2017 ransomware☆18Updated 7 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 5 years ago
- I updated the exploit code by Project Zero to gain root shell on iOS devices that I own. Deleted the previous repo and pushing in new one…☆11Updated 8 years ago