CERTCC / dranzerLinks
Dranzer is a tool that enables users to examine effective techniques for fuzz testing ActiveX controls
☆35Updated 10 years ago
Alternatives and similar repositories for dranzer
Users that are interested in dranzer are comparing it to the libraries listed below
Sorting:
- ☆54Updated 8 years ago
- UAC 0Day all day!☆57Updated 8 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Updated 8 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Updated 9 years ago
- ☆43Updated 7 years ago
- My manual analysis of malware families☆13Updated 8 years ago
- Scripts targeting specific families☆13Updated 8 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 7 years ago
- x86_64 linux rootkit using debug registers☆53Updated 3 years ago
- ☆36Updated 8 years ago
- ☆43Updated 7 years ago
- DLL Injection Library & Tools☆73Updated 9 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Updated 8 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Updated 4 years ago
- Using SEH to bypass CFG☆30Updated 8 years ago
- A set of demos and a PowerShell module to interact with DotNetInterop.☆68Updated 7 years ago
- ☆43Updated 7 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 10 years ago
- CVE-2016-0040 Privilege Escalation Exploit For WMI Receive Notification Vulnerability (x86-64)☆14Updated 7 years ago
- ☆50Updated 8 years ago
- Malware Sandbox Emulation in Python @ HITCON 2018☆46Updated 7 years ago
- ☆22Updated 8 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆43Updated 9 years ago
- AxMan ActiveX Fuzzer: This is ancient, please don't use it =D☆28Updated 4 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- Miscellanous scripts used for malware analysis☆23Updated 7 years ago
- public bugs/proof of concepts☆50Updated 4 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago