Cn33liz / HSEVD-StackOverflowGDI
☆20Updated this week
Related projects: ⓘ
- ☆21Updated this week
- ☆15Updated this week
- PCAUSA Rawether for Windows Local Privilege Escalation☆36Updated 7 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆36Updated 10 years ago
- ☆28Updated 7 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆41Updated 11 years ago
- ☆26Updated 8 years ago
- ☆16Updated this week
- Exploiting CVE-2016-0040 uninitialized pointer☆45Updated 8 years ago
- ☆29Updated this week
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 7 years ago
- ☆9Updated 9 years ago
- ☆22Updated 7 years ago
- ☆28Updated this week
- ☆11Updated this week
- CVE-2014-0816☆24Updated 7 years ago
- Static analysis tools for x86 assembly☆13Updated 7 years ago
- ☆33Updated 9 years ago
- ☆22Updated 7 years ago
- Decrement Windows Kernel for fun and profit☆38Updated 6 years ago
- Automated library compilation and PDB annotation with CMake and IDA Pro☆20Updated 6 years ago
- ☆35Updated 6 years ago
- Malpimp is an advanced API tracing tool and designed to automate the reverse engineering process. In the backend it uses pydbg to hook t…☆8Updated 8 years ago
- ☆33Updated 6 years ago
- ☆33Updated this week
- ☆27Updated this week
- Trigger and exploit code for CVE-2014-4113☆42Updated 8 years ago
- Slides of 44Con 2018☆21Updated 5 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆52Updated 7 years ago
- ☆32Updated 7 years ago