Borrowed Instructions Synthetic Computation
☆70Feb 20, 2015Updated 11 years ago
Alternatives and similar repositories for bisc
Users that are interested in bisc are comparing it to the libraries listed below
Sorting:
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- Sequitur (context free grammar) fuzzer, maximum code coverage/set covering, plus other tools.☆19Jan 27, 2011Updated 15 years ago
- Measure branching along code paths☆18Oct 25, 2016Updated 9 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Jul 1, 2014Updated 11 years ago
- 010 Editor Template for parsing VMware Disk(vmdk) images☆16Sep 12, 2018Updated 7 years ago
- A tool to leverage Virus Total's API key with advanced queries to download malware(s) and report(s).☆11Apr 24, 2013Updated 12 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- Phishing e-mail repository☆36Apr 7, 2020Updated 5 years ago
- ☆48Oct 19, 2015Updated 10 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- ☆13Dec 27, 2023Updated 2 years ago
- blog☆14Jan 1, 2020Updated 6 years ago
- XXE OOB Exploitation Toolset for Automation☆63Jan 20, 2014Updated 12 years ago
- OS X tool for dumping IOKit hierarchies in DOT format.☆46Feb 7, 2016Updated 10 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- A collection of scripts based on libclang for extracting API information from interpreters☆25Jul 10, 2012Updated 13 years ago
- Tool for inspecting Windows Phone applications☆28Jun 7, 2013Updated 12 years ago
- Immunity Debugger Taint Tracer☆20Jun 18, 2013Updated 12 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- Windows Kernel Dump Analyzer☆15May 9, 2015Updated 10 years ago
- ☆87Jun 5, 2015Updated 10 years ago
- Parse HTTP Security Headers☆40Sep 12, 2024Updated last year
- HSAIL Instruction Set Simulator - for testing execution of HSAIL Brig files☆36Sep 18, 2014Updated 11 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Sep 10, 2013Updated 12 years ago
- PE file parser☆37Sep 13, 2015Updated 10 years ago
- Binary Analysis Platform☆74Oct 21, 2013Updated 12 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆54Jun 19, 2016Updated 9 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- A symbolic execution engine for Python☆44Dec 4, 2012Updated 13 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- The Zulu fuzzer☆124Sep 25, 2017Updated 8 years ago
- x64dbg conditional branches logger [Plugin]☆72Mar 20, 2017Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Aug 19, 2018Updated 7 years ago
- Extra modules for the Mercury Android Security Assessment Framework.☆24Jul 10, 2013Updated 12 years ago
- ☆23Jul 18, 2016Updated 9 years ago