ynadji / peidLinks
☆19Updated 10 years ago
Alternatives and similar repositories for peid
Users that are interested in peid are comparing it to the libraries listed below
Sorting:
- ☆32Updated last year
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 10 years ago
- Parses MSDN documentation into an XML file☆31Updated 14 years ago
- A pure-python win32 debugger interface.☆28Updated 10 years ago
- vstruct based dissectors for various file/protocol formats☆15Updated 8 years ago
- RemoteBridge is a library that allows you to access internal COM and JAVA objects used by third-party applications remotely.☆35Updated 8 years ago
- a collection of yara rules for binary analysis☆24Updated 8 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 9 years ago
- Collection of IDA Pro plugins I wrote over the years☆24Updated 15 years ago
- A PowerShell binding for the Unicorn Engine☆17Updated 10 years ago
- Imports MSDN documentation into IDA Pro☆52Updated 14 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆91Updated 9 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 10 years ago
- ☆27Updated 3 years ago
- CmdDesktopSwitch is a small utility that lists all windows desktops and provides the option to switch between them. This can be used to i…☆35Updated 9 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 11 years ago
- A repository of example plugins for Relyze Desktop.☆34Updated 5 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 11 years ago
- exploit dev. stuff☆20Updated 13 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Updated 10 years ago
- Analysis PE file or Shellcode☆50Updated 9 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 9 years ago
- This is an OllyDbg plugin which will help you to import map files exported by IDA, Dede, IDR, Microsoft and Borland linkers.☆22Updated 10 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 11 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Updated 10 years ago
- Sample libraries to be used with IAT Patcher☆36Updated 3 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago
- Automatically exported from code.google.com/p/ospy☆98Updated 10 years ago