zznop / bn-brainfuck
Brainfuck architecture module and loader for Binary Ninja
☆15Updated 3 years ago
Alternatives and similar repositories for bn-brainfuck
Users that are interested in bn-brainfuck are comparing it to the libraries listed below
Sorting:
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Regular expression Search on the command-line☆16Updated last month
- Experiments on C/C++ Exploits☆22Updated 4 years ago
- Binary Ninja script to decrypt strings in Mirai samples☆19Updated 3 years ago
- Ghidra's development plugins, scripts, contributing. Presentation☆12Updated 4 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- A medley of PoCs and exploits☆1Updated 5 years ago
- Patch a Windows PE (.exe, .dll, etc..) so it no longer loads with a random dynamic base. Saves changing breakpoint addresses between debu…☆15Updated 5 years ago
- keynote I gave at GreHack 2019☆18Updated 5 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- JS modules for Frida based tools to add code coverage to your instrumentation scripts.☆26Updated 6 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 4 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- bunch of random stuff☆21Updated 5 years ago
- ASLR bypass in Chrome version 77☆24Updated 5 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- ☆22Updated 4 years ago
- Export a binary from ghidra to emulate with unicorn☆26Updated 5 years ago
- CTF binary exploit code☆38Updated 6 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Updated 5 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆37Updated 12 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- Proof-of-Concepts for fixed bugs☆7Updated 4 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆43Updated last year
- Kernel Cache Decryption for iOS☆14Updated 3 years ago
- IDAPython plugin to integrate Visual Studio Help Viewer in IDA Pro >= 6.8☆12Updated 8 years ago
- Tool for working with memory of a running Linux process☆12Updated 4 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago