Borrowed Instructions Synthetic Computation
☆70Feb 20, 2015Updated 11 years ago
Alternatives and similar repositories for bisc
Users that are interested in bisc are comparing it to the libraries listed below
Sorting:
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- Sequitur (context free grammar) fuzzer, maximum code coverage/set covering, plus other tools.☆19Jan 27, 2011Updated 15 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Jul 1, 2014Updated 11 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- ☆13Dec 27, 2023Updated 2 years ago
- Measure branching along code paths☆18Oct 25, 2016Updated 9 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- OS X tool for dumping IOKit hierarchies in DOT format.☆46Feb 7, 2016Updated 10 years ago
- ☆48Oct 19, 2015Updated 10 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- Phishing e-mail repository☆36Apr 7, 2020Updated 5 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆54Jun 19, 2016Updated 9 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- ☆23Jul 18, 2016Updated 9 years ago
- Tool to analyze 64-bit binaries with 32-bit Hex-Rays Decompiler☆79Jan 11, 2015Updated 11 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- An ARP based Operating System version scanner☆14Jan 21, 2013Updated 13 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆48Sep 28, 2016Updated 9 years ago
- Cryptowall Tooling & Information☆37Mar 3, 2016Updated 9 years ago
- Research tools for understanding the insides of HBOOT☆19May 13, 2013Updated 12 years ago
- A tool to leverage Virus Total's API key with advanced queries to download malware(s) and report(s).☆11Apr 24, 2013Updated 12 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Script to find exploitable magic methods for PHP object injection☆27Dec 4, 2014Updated 11 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- Pintool to detect Read before Write memory access☆21Mar 20, 2013Updated 12 years ago
- Minimal ARM/Thumb linear sweep disassembler similar to objdump☆10Jun 6, 2016Updated 9 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago