CERTCC / dranzerLinks
Dranzer is a tool that enables users to examine effective techniques for fuzz testing ActiveX controls
☆34Updated 10 years ago
Alternatives and similar repositories for dranzer
Users that are interested in dranzer are comparing it to the libraries listed below
Sorting:
- ☆43Updated 7 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Updated 8 years ago
- UAC 0Day all day!☆57Updated 8 years ago
- ☆22Updated 8 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- ☆53Updated 8 years ago
- Using SEH to bypass CFG☆29Updated 8 years ago
- Scripts targeting specific families☆13Updated 8 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆55Updated 8 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- A set of demos and a PowerShell module to interact with DotNetInterop.☆68Updated 7 years ago
- ☆43Updated 6 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- ☆36Updated 7 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆52Updated 7 years ago
- ☆43Updated 6 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 7 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆81Updated 8 years ago
- My manual analysis of malware families☆13Updated 8 years ago
- AxMan ActiveX Fuzzer: This is ancient, please don't use it =D☆28Updated 4 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Updated 8 years ago
- public bugs/proof of concepts☆51Updated 4 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 7 years ago
- black hat Asia 2017 Slides☆22Updated 8 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 10 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago