CERTCC / dranzerLinks
Dranzer is a tool that enables users to examine effective techniques for fuzz testing ActiveX controls
☆35Updated 10 years ago
Alternatives and similar repositories for dranzer
Users that are interested in dranzer are comparing it to the libraries listed below
Sorting:
- ☆54Updated 8 years ago
- ☆43Updated 7 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- Scripts targeting specific families☆13Updated 8 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Updated 4 years ago
- Using SEH to bypass CFG☆30Updated 8 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 10 years ago
- My manual analysis of malware families☆13Updated 8 years ago
- ☆22Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Updated 9 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆44Updated 7 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Updated 9 years ago
- public bugs/proof of concepts☆50Updated 4 years ago
- UAC 0Day all day!☆57Updated 8 years ago
- ☆36Updated 8 years ago
- ☆50Updated 8 years ago
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- A set of demos and a PowerShell module to interact with DotNetInterop.☆68Updated 7 years ago
- x86_64 linux rootkit using debug registers☆53Updated 4 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆37Updated 12 years ago
- AxMan ActiveX Fuzzer: This is ancient, please don't use it =D☆28Updated 5 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- Educational repository for learning about rootkits and Windows Kernel Hooks.☆49Updated 10 years ago
- Windows Inline function hooking library targeted at MSVC☆27Updated 9 years ago
- DLL Injection Library & Tools☆73Updated 9 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆82Updated 8 years ago
- A Generic Windows Memory Scraping Tool☆71Updated 8 years ago