Malicious docx generator to exploit CVE-2021-40444 (Microsoft Office Word Remote Code Execution) Creation of this Script is based on some reverse engineering over the sampleRead more
Obfuscation Detection Automatically detect obfuscated code and other state machines Scripts to automatically detect obfuscated code and state machines in binaries. Implementation is based onRead more
Karta “Karta” (Russian for “Map”) is an IDA Python plugin that identifies and matches open-sourced libraries in a given binary. The plugin uses a uniqueRead more
AutoHarness AutoHarness is a tool that automatically generates fuzzing harnesses for you. This idea stems from a concurrent problem in fuzzing codebases today: large codebasesRead more
fpicker fpicker is a Frida-based fuzzing suite that offers a variety of fuzzing modes for in-process fuzzing, such as an AFL++ mode or a passiveRead more
Process Dump Process Dump is a Windows reverse-engineering command-line tool to dump malware memory components back to disk for analysis. Often malware files are packedRead more
To flutter: to move in quick, irregular motions, to beat rapidly, to be agitated.Doldrums: a period of stagnation. Doldrums is a reverse engineering tool forRead more
Packet Sender Packet Sender is an open-source utility to allow sending and receiving TCP, UDP, and SSL (encrypted TCP) packets. The mainline branch officially supportsRead more
Almost four months after it was first spotted in the wild, the infosec community is still scratching its head in regards to the purpose ofRead more
Heappy is an editor based on gdb/gef that helps you to handle the heap during your exploitation development.The project should be considered a didactic toolRead more
FRIDA-DEXDump Fast search and dump dex on memory Features support fuzzy search broken header dex. fix struct data of dex-header. compatible with all android versionsRead more
ADS goes here!If you don't see it, then please turn OFF
AD blocker for this website.
Our ads are not aggressive and help us
pay for the server and coffee.
THANK YOU for your support!