zardus / deadbeef
The deadbeef module produces hexspeak for nefarious purposes.
☆9Updated 8 years ago
Related projects: ⓘ
- Format string exploit generation☆9Updated 9 years ago
- CTF exploit development and other tools of pwnage☆21Updated 5 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 9 years ago
- Memory awesomeness.☆29Updated 9 years ago
- ☆26Updated 8 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 5 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 9 years ago
- This repository is for binaries that are currently being worked on to be solved by angr.☆11Updated 7 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 6 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 8 years ago
- Application Security library☆11Updated 11 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 11 years ago
- ☆12Updated 8 years ago
- ☆11Updated this week
- Analyzes open source bug trackers for interesting vulnerabilities☆22Updated 9 years ago
- Tool for automation of GUI-based testing.☆15Updated 9 years ago
- Regular expression Search on the command-line☆15Updated 5 months ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆34Updated 4 years ago
- ☆12Updated this week
- An architecture plugin for binary ninja to disassemble raw python bytecode☆28Updated 6 years ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 5 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- finals-2014☆21Updated 7 years ago
- ☆14Updated this week
- A pure-python win32 debugger interface.☆28Updated 8 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 13 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- Phishing Toolkit☆19Updated 6 years ago