Memory awesomeness.
☆29Mar 22, 2015Updated 10 years ago
Alternatives and similar repositories for memcurses
Users that are interested in memcurses are comparing it to the libraries listed below
Sorting:
- Adds another code segment to an existing program. Experimental: can take in ELF-compiled stuff.☆19Mar 4, 2016Updated 9 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated 10 months ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- Abstract Binary Format Manipulation - ELF, PE and Mach-O format☆119Aug 20, 2015Updated 10 years ago
- checksec-ng. Elf checksec in Python. Does large-scale package analysis. Now with multi-core support!☆68Mar 19, 2014Updated 11 years ago
- Gdb Extension Framework is a bunch of python code around the gdb api.☆50Jun 12, 2021Updated 4 years ago
- Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API.☆77Jul 14, 2020Updated 5 years ago
- Runtime code injection suite for exploring OS X process security☆40Jun 1, 2009Updated 16 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- Adds symbols to a ELF file.☆65Jul 25, 2015Updated 10 years ago
- browser narlyness☆50Dec 11, 2013Updated 12 years ago
- Collection of scripts for radare2☆27Jan 1, 2019Updated 7 years ago
- Exploits used on hacking CTF's☆28Sep 16, 2019Updated 6 years ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Host files with DNS☆33Mar 1, 2016Updated 10 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Apr 20, 2016Updated 9 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆55May 8, 2021Updated 4 years ago
- Watch actual usage of memory(RAM) of an Application/Program to debug the memory leak issue☆26Feb 19, 2016Updated 10 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Binary Analysis Platform☆74Oct 21, 2013Updated 12 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Dec 5, 2014Updated 11 years ago
- Hackerone disclosed report URL Aggregator☆30Oct 31, 2018Updated 7 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- Proof Of Concept for inserting code in ELF binaries.