zznop / bn-brainfuckLinks
Brainfuck architecture module and loader for Binary Ninja
☆18Updated 2 weeks ago
Alternatives and similar repositories for bn-brainfuck
Users that are interested in bn-brainfuck are comparing it to the libraries listed below
Sorting:
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Experiments on C/C++ Exploits☆22Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- ☆11Updated 4 years ago
- Ghidra consonance and make it more ida-ish☆16Updated 6 years ago
- A medley of PoCs and exploits☆1Updated 6 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- Tool for working with memory of a running Linux process☆12Updated 4 years ago
- JS modules for Frida based tools to add code coverage to your instrumentation scripts.☆26Updated 6 years ago
- bunch of random stuff☆21Updated 5 years ago
- keynote I gave at GreHack 2019☆18Updated 5 years ago
- Plugin for Frida in Binary Ninja☆27Updated 4 years ago
- IDAPython plugin for finding Xrefs from a function☆48Updated 9 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆55Updated 5 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Updated 4 years ago
- Dalvik Header Plugin for IDA Pro☆22Updated 12 years ago
- An opensource API hooking framework☆22Updated 5 years ago
- IDAPython plugin to integrate Visual Studio Help Viewer in IDA Pro >= 6.8☆12Updated 8 years ago
- ☆9Updated 6 years ago
- My notes about Genyatyk VM crackme☆26Updated 5 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- ☆18Updated 6 years ago
- ASLR bypass in Chrome version 77☆24Updated 5 years ago
- Scripts for x64dbg to find the OEP of exe files packed with UPX☆14Updated 7 years ago
- Binary Ninja script to decrypt strings in Mirai samples☆19Updated 4 years ago
- ☆45Updated 7 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- ☆14Updated 6 years ago
- This is the source of our Return Oriented Programming tool.☆15Updated 5 years ago