Tool for profiling heap usage and memory management
☆27Oct 31, 2021Updated 4 years ago
Alternatives and similar repositories for vizzy
Users that are interested in vizzy are comparing it to the libraries listed below
Sorting:
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- The Linux x86/x86-64 last chance debugging tool☆48Nov 7, 2022Updated 3 years ago
- Framework for generating audit commands for Unix security audits☆66Aug 1, 2023Updated 2 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- DC540 hacking challenge 0x00005b.☆16Nov 26, 2025Updated 3 months ago
- EPSS(Exploit Prediction Scoring System) API client☆20Oct 30, 2025Updated 4 months ago
- Kernel Read Write Execute☆46Jan 13, 2025Updated last year
- Erku is an IPTV and video on demand client for the Roku OS.☆12Dec 29, 2024Updated last year
- PoC plugin for jadx-gui to evaluate methods and update decompiler output☆24Nov 24, 2025Updated 3 months ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- Repository for officially supported Binary Ninja plugins☆57Feb 24, 2026Updated last week
- Disable SSL certificate verification for all binaries that use libssl☆48Jul 15, 2022Updated 3 years ago
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.☆27Nov 29, 2022Updated 3 years ago
- A memory scanner made in python for linux☆22Jun 6, 2021Updated 4 years ago
- A tool that generates scripts, determine story element synergy, and best advertisers☆19Jan 3, 2026Updated 2 months ago
- SEViz (Symbolic Execution VisualIZer) is a tool for visualizing symbolic execution-based test generation☆20Nov 24, 2015Updated 10 years ago
- ESP32 ROM blob to ELF convertor☆22May 9, 2018Updated 7 years ago
- Moved to HappyHackingSpace/metamaska☆23Feb 11, 2026Updated 3 weeks ago
- An architecture plugin for binary ninja to disassemble raw python bytecode☆29Nov 12, 2017Updated 8 years ago
- Android malware static & dynamic analysis and automated action (deprecated)☆21May 18, 2021Updated 4 years ago
- x86/x64 Ring 0/-2 System Freezer/Debugger☆120May 21, 2025Updated 9 months ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Nov 12, 2023Updated 2 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆126May 15, 2023Updated 2 years ago
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆40Oct 26, 2023Updated 2 years ago
- ESP32 Firmware Patching Framework with Streamlined Binary/Runtime Patching Methods. Used in conjunction with Platformio and Ghidra.☆37Feb 4, 2022Updated 4 years ago
- A small and portable Windows C library for sandbox detection☆35Oct 2, 2023Updated 2 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Jun 25, 2018Updated 7 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆34Dec 19, 2021Updated 4 years ago
- A tracing tool to analyze the I/O behavior of a program.☆12Sep 25, 2019Updated 6 years ago
- 91-95 Jeep and Dodge EPROMS☆13Nov 25, 2025Updated 3 months ago
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆86May 13, 2024Updated last year
- In-memory OLAP SQL server for object storage data.☆14Oct 15, 2025Updated 4 months ago
- Ultrix is a meme website for collecting memes and sharing them with friends on the website.☆12Jan 29, 2019Updated 7 years ago
- A small app for creating and rendering lyric videos.☆10Dec 12, 2022Updated 3 years ago
- Miscellaneous small bits and bobs.☆11Sep 8, 2025Updated 5 months ago
- ☆12Sep 1, 2025Updated 6 months ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Mar 27, 2024Updated last year