- United States
- https://raywang.tech
Stars
- All languages
- Assembly
- C
- C#
- C++
- CSS
- Coq
- Cuda
- Dockerfile
- Emacs Lisp
- F#
- Go
- HCL
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jinja
- Jsonnet
- Julia
- Jupyter Notebook
- Kotlin
- LLVM
- MDX
- MLIR
- Markdown
- Max
- Mustache
- Objective-C
- PHP
- Python
- Rocq Prover
- Ruby
- Rust
- Shell
- Starlark
- Swift
- SystemVerilog
- TeX
- TypeScript
- Vim Script
- YARA
- Zeek
UNIX-like reverse engineering framework and command-line toolset
Official QEMU mirror. Please see https://www.qemu.org/contribute/ for how to submit changes to QEMU. Pull Requests are disabled. Please only use release tarballs from the QEMU website.
xoreaxeaxeax / movfuscator
Forked from Battelle/movfuscatorThe single instruction C compiler
A repository for learning various heap exploitation techniques.
linux-kernel-exploits Linux平台提权漏洞集合
A small utility to modify the dynamic linker and RPATH of ELF executables
A library of common data structures and algorithms written in C.
Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.
Platform for Architecture-Neutral Dynamic Analysis
Read-only mirror of Trusted Firmware-A
Windows tool for dumping malware PE files from memory back to disk for analysis.
Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU
x64dbg / x64dbgpy
Forked from realgam3/x64dbg-pythonAutomating x64dbg using Python, Snapshots:
Library and command line tool to detect SHA-1 collision in a file
This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structure.
DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidSco…