Security introduction book
☆23Jan 10, 2016Updated 10 years ago
Alternatives and similar repositories for ROP-intro-and-foreland
Users that are interested in ROP-intro-and-foreland are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- ☆12Oct 20, 2016Updated 9 years ago
- ☆15Mar 28, 2015Updated 11 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆41Dec 31, 2020Updated 5 years ago
- ☆30Jul 11, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Windows平台下的细粒度污点分析工具☆49Mar 16, 2017Updated 9 years ago
- Scala for the Impatient (2nd edition) - My Solutions☆10Dec 22, 2017Updated 8 years ago
- Lightweight x86 and x64 instructions disassembler☆35Feb 24, 2018Updated 8 years ago
- C++11 textbook (Chinese Translation)☆11Mar 29, 2016Updated 10 years ago
- Wechat PC Open More [PC 微信 多开 Demo]☆10Dec 20, 2018Updated 7 years ago
- Linux Exploit 学习笔记~☆10Aug 11, 2018Updated 7 years ago
- Intel PIN rocks☆15Jun 5, 2012Updated 13 years ago
- A VMBR (Virtual-Machine Based Rootkit) which runs a guest OS and sends the attacker its data☆28Apr 27, 2024Updated 2 years ago
- R3劫持所有异常☆15Jan 4, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Apr 10, 2015Updated 11 years ago
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- Clone of JSAI static analysis framework☆12Jul 29, 2017Updated 8 years ago
- ☆18May 18, 2018Updated 8 years ago
- ZeroRAT是一款windows上的一句话远控☆63Mar 12, 2016Updated 10 years ago
- Code-Reuse Exploits detection using Intel Processor Trace☆27May 19, 2018Updated 8 years ago
- libemu shim layer and win32 environment for Unicorn Engine☆73Apr 14, 2017Updated 9 years ago
- ☆34Jul 28, 2018Updated 7 years ago
- 应急响应实战笔记,一个安全工程师的自我修养。☆20Jun 2, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- Interprocess communication library, providing the ability to call functions from each other☆20Oct 3, 2019Updated 6 years ago
- Prolog specification of TensorFlow layers☆13Jun 12, 2023Updated 2 years ago
- like ROP Defender☆10May 6, 2015Updated 11 years ago
- Libraries written in inline assembly☆19Aug 7, 2023Updated 2 years ago
- ☆21Aug 22, 2022Updated 3 years ago
- A simple tool for enumerating dynamic endpoints on a DCE/RPC remote or local endpoint mapper.☆15Oct 9, 2020Updated 5 years ago
- SyzTrust's main repository. Start here to install.☆19Feb 29, 2024Updated 2 years ago
- Prototype for a game testing framework using AI methods☆10Feb 25, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 参考taviso的代码逆向一下mpengine.dll☆20Jun 30, 2022Updated 3 years ago
- ☆15Jun 12, 2015Updated 10 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- CVE-2016-0040 Privilege Escalation Exploit For WMI Receive Notification Vulnerability (x86-64)☆14Jun 7, 2018Updated 7 years ago
- A Secure Version of DATAVIEW using SGX techniques.☆10Jul 6, 2021Updated 4 years ago
- A novel rootkit under linux(test under cents 5.4) combine with preload_inject and sys_table modify☆19Nov 2, 2013Updated 12 years ago
- 扫描常见未授权访问(改)(redis、mongodb、memcached、elasticsearch、zookeeper、ftp、CouchDB、docker、Hadoop)☆15Aug 4, 2020Updated 5 years ago