wireshrink / RECONMTL-2017View external linksLinks
Recon materials
☆27Nov 18, 2017Updated 8 years ago
Alternatives and similar repositories for RECONMTL-2017
Users that are interested in RECONMTL-2017 are comparing it to the libraries listed below
Sorting:
- ☆13Jun 13, 2017Updated 8 years ago
- IDA AArch64 processor extender extension: Adding support for ARMv8.1 opcodes☆53Sep 11, 2017Updated 8 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- Reverse Engineering tool for Ethereum EVM☆20Jun 30, 2016Updated 9 years ago
- build system to cross-compile cydia packages for cydia.radare.org☆10Aug 23, 2019Updated 6 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- ☆26Jun 23, 2016Updated 9 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Jan 24, 2017Updated 9 years ago
- Tools and library to manipulate EFI variables.☆10Jan 16, 2026Updated last month
- Parallel APK analyzer☆51Jan 10, 2017Updated 9 years ago
- Automatically exported from code.google.com/p/timing-attestation☆13Jun 29, 2015Updated 10 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- Make Windows VMs Faster☆32Jun 30, 2013Updated 12 years ago
- Binfuzz.js: A Binary Fuzzer in JavaScript☆30Aug 1, 2013Updated 12 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- american fuzzy lop fuzzer from lcamtuf☆14Oct 31, 2014Updated 11 years ago
- tool for statically reconstructing the IOKit classes hierarchy from iOS kernelcache dumps☆109Jul 4, 2016Updated 9 years ago
- Stores Chromium Channel ID private keys in an Intel SGX enclave.☆33Jun 13, 2016Updated 9 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- 🦑 A friendly Ruby API to iptables.☆15May 6, 2017Updated 8 years ago
- ☆12Nov 9, 2017Updated 8 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Nov 28, 2017Updated 8 years ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- ☆15Jul 12, 2020Updated 5 years ago
- A Retargettable CFI implementation in LLVM. Authors: Joseph Battaglia and Oulin Yao☆18May 8, 2015Updated 10 years ago
- Betraying the BIOS: Where the Guardians of the BIOS are Failing☆59Jul 28, 2017Updated 8 years ago
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆90Sep 18, 2016Updated 9 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Mar 16, 2017Updated 8 years ago
- A software driver that lets you log kernel-mode debug output into a file on Windows.☆108Jul 24, 2018Updated 7 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- CVE-2017-5005 for Quick Heal Antivirus☆15Mar 31, 2017Updated 8 years ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- CVE-2016-3141☆15Apr 23, 2016Updated 9 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Dec 31, 2018Updated 7 years ago