Go package that aids in binary analysis and exploitation
☆178Jul 17, 2021Updated 4 years ago
Alternatives and similar repositories for sploit
Users that are interested in sploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- ☆20Feb 23, 2019Updated 7 years ago
- 🐘 A Go library to probe ELF files☆11Mar 5, 2020Updated 6 years ago
- A Binary Ninja plugin for vulnerability research.☆301Sep 7, 2024Updated last year
- Golang Implant & Post-Exploitation Framework☆60Jun 30, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆495Apr 1, 2021Updated 4 years ago
- A polyglot payload generator☆244Aug 15, 2022Updated 3 years ago
- Keyhack - Golang API token/webhook validator☆16Mar 20, 2025Updated last year
- ☆15Nov 4, 2020Updated 5 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆124Jul 30, 2020Updated 5 years ago
- Exploit Development, Reverse Engineering & Cryptography☆256Feb 26, 2026Updated 3 weeks ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Automatic ROPChain Generation☆302Updated this week
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆380Aug 13, 2021Updated 4 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆25Feb 11, 2024Updated 2 years ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆41Oct 19, 2020Updated 5 years ago
- Super simple Unicorn based CLI arm64 emulator☆11Nov 11, 2020Updated 5 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- Reflectively load PE☆106Aug 4, 2020Updated 5 years ago
- A malware analysis and classification tool.☆190Dec 3, 2021Updated 4 years ago
- Go library to scan regular expression capture group to variable similar to fmt.Scanf☆14Dec 15, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- MacOS kernel memory leak (4 bytes)☆30Apr 14, 2020Updated 5 years ago
- Port of devttyS0's IDA plugins to the Ghidra plugin framework, new plugins as well.☆495May 3, 2021Updated 4 years ago
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- ☆14Jun 21, 2020Updated 5 years ago
- Export disassemblies into Protocol Buffers☆1,178Feb 2, 2026Updated last month
- easy dll proxying in go☆14Apr 24, 2022Updated 3 years ago
- Multi-tool reverse engineering collaboration solution.☆142Mar 27, 2024Updated last year
- Coverage-guided binary fuzzing powered by Frida Stalker☆184May 2, 2021Updated 4 years ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,162Nov 14, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆404Jun 6, 2020Updated 5 years ago
- A denial-of-service proof-of-concept for CVE-2020-1350☆237Jul 17, 2020Updated 5 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆139Jan 5, 2023Updated 3 years ago
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities☆350Sep 25, 2023Updated 2 years ago
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆230Jul 30, 2020Updated 5 years ago
- dynamic binary analysis via platform emulation☆904Jun 1, 2023Updated 2 years ago