yotsubo / o-checkerLinks
☆11Updated 8 years ago
Alternatives and similar repositories for o-checker
Users that are interested in o-checker are comparing it to the libraries listed below
Sorting:
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 6 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 7 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Updated 7 years ago
- Linux-KVM with rVMI extensions☆22Updated 8 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 6 years ago
- Vagrant setup for building a machine for CTF/exploit development☆21Updated 6 years ago
- python and honggfuzz☆26Updated 5 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Updated 8 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Updated 8 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 9 years ago
- ☆17Updated 5 years ago
- Regular expression Search on the command-line☆16Updated 9 months ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- ☆32Updated last year
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 5 years ago
- ☆28Updated 8 years ago
- ☆14Updated 6 years ago
- ☆14Updated 6 years ago
- An Extensible Dynamic Analysis Framework for IoT Devices☆21Updated 7 years ago
- Towards Generic Deobfuscation of Windows API Calls☆50Updated 6 years ago
- Using LibVMI to detect malware☆31Updated 3 years ago
- Writeups of CTF challenges I do☆13Updated 6 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- ☆23Updated 6 years ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 6 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago