a python framework for hooking pure python functions
☆27Jun 7, 2021Updated 4 years ago
Alternatives and similar repositories for bytehook
Users that are interested in bytehook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of repositories used to make ISTS 16 possible.☆15Feb 13, 2018Updated 8 years ago
- Regular expression Search on the command-line☆16Mar 31, 2025Updated last year
- An architecture plugin for binary ninja to disassemble raw python bytecode☆29Nov 12, 2017Updated 8 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- ☆20Sep 25, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Apr 13, 2018Updated 7 years ago
- Configs for NECCDC 2017☆16Mar 22, 2017Updated 9 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis system☆18Mar 25, 2021Updated 5 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Dec 24, 2019Updated 6 years ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 11 months ago
- A lightweight hypervisor for forensics☆12Sep 1, 2015Updated 10 years ago
- ☆13Jan 24, 2019Updated 7 years ago
- Failure dataset accompanying the paper "How Bad Can a Bug Get? An Empirical Analysis of Software Failures in the OpenStack Cloud Computi…☆10Jun 12, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Determines if a number is odd or not - using machine learning!☆14Dec 15, 2018Updated 7 years ago
- Internal Testing Chain☆11Sep 21, 2022Updated 3 years ago
- This tool is for free downloading IMAGE, VECTOR, VIDEO and ILLUSTRATOR files from pixabay.☆11Feb 23, 2021Updated 5 years ago
- A feature-rich modern C++ string class☆12May 23, 2020Updated 5 years ago
- uc::jni is a Java Native Interface (JNI) wrapper library created C++14 single-header.☆11Aug 4, 2019Updated 6 years ago
- Mahout入门实例-基于 Apache Mahout 构建社会化推荐引擎-实战(参考IBM)☆10May 2, 2014Updated 11 years ago
- ☆11Sep 10, 2021Updated 4 years ago
- lz-string implementation in C++☆16Oct 17, 2021Updated 4 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This is a python version of samesame repo to generate homograph strings☆24Aug 22, 2018Updated 7 years ago
- Bindings to the JNI library on Android for Kotlin/Native☆14Apr 30, 2024Updated last year
- An Android application, designed as a reference point, that implements an array of tamper and root detection methods - inspired by Google…☆15Jul 21, 2020Updated 5 years ago
- ☆15Jan 7, 2023Updated 3 years ago
- Thanks to LGLTeam☆14Jun 16, 2022Updated 3 years ago
- Heap encryption in Nim☆20Aug 25, 2024Updated last year
- Frida release engineering tools☆17Mar 11, 2026Updated 3 weeks ago
- Jni++ : Thread-safe and type-safe C++11 wrap for Android JNI.☆12Jul 25, 2017Updated 8 years ago
- Implementation of TCP connection tracking in eBPF☆14May 9, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A Python library for anomaly detection☆13Aug 28, 2017Updated 8 years ago
- c++ 17 single header event-system☆10Sep 1, 2021Updated 4 years ago
- NetHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering☆13Mar 17, 2022Updated 4 years ago
- A nim implementation of sRDI☆20Oct 18, 2023Updated 2 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- WinHTTP example☆17Feb 6, 2016Updated 10 years ago