PESecurity PowerShell script to check if a Windows binary (EXE/DLL) has been compiled with ASLR, DEP, SafeSEH,...
Reverse Engineering
Shellen Shellen is an interactive shellcoding environment. If you want a handy tool to write shellcodes, then...
djangoctf v1.1 A platform for jeopardy CTF (capture-the-flag) competitions written in Django. CTF cybersecurity competitions have become...
PE Tool to analyze PE files in python 3. Current features : Show information about the file...
IDAPython Embedded Toolkit The IDAPython Embedded Toolkit is a set of script to automate many of the...
Shellcode Factory tool A tool to print and test shellcodes from assembly code. It supports both Gas...
Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization. It runs as a normal user...
TitanHide is a driver intended to hide debuggers from certain processes. The driver hooks various Nt* kernel...
CTF Works Tools and scripts for CTF exploit/pwnable challenge development. Challenge Organization Each challenge goes in its own directory...
Building gargoyle gargoyle is only implemented for 32-bit Windows (64-bit Windows on Windows is fine). You must...
Voltron is an extensible debugger UI toolkit written in Python. It aims to improve the user experience...
Viper is a binary analysis and management framework. Its fundamental objective is to provide a solution to...
DriverBuddy is an IDAPython plugin that helps automate some of the tedium surrounding the reverse engineering of...
PoC code implementing variant 3a of the Meltdown attack for AArch64. This allows reading all (potentially excluding...