zed-0xff / lltdscanLinks
Scan for LLTD-enabled hosts on your network
☆24Updated 4 years ago
Alternatives and similar repositories for lltdscan
Users that are interested in lltdscan are comparing it to the libraries listed below
Sorting:
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- An EFI image parser and dissector☆52Updated 12 years ago
- Miscellaneous IDA scripts and projects☆14Updated 4 years ago
- A network stack in userspace☆23Updated 7 years ago
- UNIX domain socket tracing LD_PRELOAD wrapper, mirror from git://git.gnumonks.org/udtrace☆51Updated 6 years ago
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Updated 10 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago
- Tools for IDA☆13Updated 9 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Updated 11 years ago
- Symbol REPL☆31Updated 7 years ago
- Tool to analyze 64-bit binaries with 32-bit Hex-Rays Decompiler☆80Updated 10 years ago
- IDA Pro плагин для отображения результата Coresight ETM трассировки perf'а☆17Updated 6 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Updated 8 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- Exploit Android MSM8974 Chipset☆13Updated 10 years ago
- ELF/PE/Mach-O parsing library☆50Updated last year
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Updated 12 years ago
- Packed Malware Analyzer (PACKMAN)☆12Updated 9 years ago
- Solutions for various crackmes☆20Updated 12 years ago
- ☆24Updated 10 years ago
- IDA recompiler☆31Updated 10 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Updated 7 years ago
- Extract LZMA sections from cable modem firmware images☆20Updated 11 years ago
- ☆31Updated 3 years ago
- unofficial grsecurity gpl release☆24Updated 6 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆40Updated 11 years ago
- IDApro idc and idapython script collection☆28Updated 2 years ago