• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

binary

  1. itsMe

    VulnFanatic (2.2) - Binary Ninja assistant plugin

    Binary Ninja assistant plugin for vulnerability research. Description: This plugin aims to assist during the vulnerability research process by providing a full tracing of sources of parameters to selected functions. It also provides a scanning capability which uses the function tracer and...
  2. itsMe

    Reverse Engineering Binary Ninja 2.0.2170

    Features The binary multi-tool and reversing platform All Reverse Engineering API Powerful Editing Performance Hex Editor https://binary.ninja/features Demo: https://binary.ninja/demo Hidden content
  3. itsMe

    C# NetLoader - Loads any C# binary in mem

    NetLoader Loads any C# binary in mem, patching AMSI and bypassing Windows Defender The binaries in this repo SHOULD be all clean and newly compiled from their respective GitHub repos, but feel free to compile / host your own. (Don't consider running binaries from this repo good OPSEC) Latest...
  4. itsMe

    Reverse Engineering Reko v0.9.1 - a binary decompiler

    Reko (Swedish: “decent, obliging”) is a C# project containing a decompiler for machine code binaries. This project is freely available under the GNU General Public License. The project consists of front ends, the core decompiler engine, and back ends to help it achieve its goals. A...
  5. itsMe

    Reverse Engineering Reko v0.9 - A Binary Decompiler

    Reko (Swedish: “decent, obliging”) is a C# project containing a decompiler for machine code binaries. This project is freely available under the GNU General Public License. The project consists of front ends, the core decompiler engine, and back ends to help it achieve its goals. A...
  6. dEEpEst

    Binary Linux Trojan

    In order to demonstrate that client side attacks and trojans are not exclusive to the Windows world, we will package a Metasploit payload in with an Ubuntu deb package to give us a shell on Linux.  We first need to download the package that we are going to infect and move it to a temporary...
  7. dEEpEst

    Binary Exploit Cheatsheet

    [hide] https://app.box.com/s/uegechcm67uwxa88skd2xhih0yw1xmhl [/Hide[
  8. 0x1

    UAC Bypass in Windows Store Binary

    Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe) Metasploit Module Hidden content Powershell Code Hidden content Code in C Hidden content    
  9. itsMe

    Reverse Engineering Py2Exe Binary Editor

    Py2Exe Binary Editor is a tool to reverse engineer py2exe generated executables. It can dump as well as modify the embedded python dll, PYTHONSCRIPT and Library.zip Features     No Python Installation needed     Can dump PYTHONSCRIPT, python dll, library.zip     Can replace PYTHONSCRIPT...
  10. 1

    Exploits systemd DynamicUser SetUID Binary Creation

    This bug report describes a bug in systemd that allows a service with DynamicUser in collaboration with another service or user to create a setuid binary that can be used to access its UID beyond the lifetime of the service. This bug probably has relatively low severity, given that there are not...
  11. itsMe

    Reverse Engineering Reko - A General Purpose Binary Decompiler

    Reko (Swedish: "decent, obliging") is a C# project containing a decompiler for machine code binaries. This project is freely available under the GNU General Public License. The project consists of front ends, core decompiler engine, and back ends to help it achieve its goals. A command-line, a...
  12. itsMe

    Reverse Engineering Bincat - Binary Code Static Analyser, With IDA Integration

    What is BinCAT? BinCAT is a static Binary Code Analysis Toolkit, designed to help reverse engineers, directly from IDA or using Python for automation. It features: value analysis (registers and memory) taint analysis type reconstruction and propagation backward and forward...
  13. J

    Cracking Anonymous direct binary sharing

    Simple file sharing services who have accepted zero log policy.Upload your binary file and get direct link for it. Size limit is set on 4mb. Hidden content
  14. 1

    Exploits Binary MLM Software 1.0 SQL Injection

    Binary MLM Software version 1.0 suffers from a remote SQL injection vulnerability. View the full article
Back
Top