CouleeApps / mach_inject_32Links
Inject libraries into 32 processes on macOS Mojave
☆16Updated 5 years ago
Alternatives and similar repositories for mach_inject_32
Users that are interested in mach_inject_32 are comparing it to the libraries listed below
Sorting:
- ☆35Updated 4 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Updated 6 years ago
- ☆35Updated 2 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆14Updated 6 years ago
- ASLR bypass in Chrome version 77☆24Updated 6 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- Windows API listing in JSON format - generated from SDK headers + SDK API documentation☆66Updated 5 years ago
- ☆14Updated 2 years ago
- IDA (sort of) headless☆26Updated last year
- ☆88Updated last year
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆22Updated 3 years ago
- Full chain Chrome 71.0.3578.98 exploit☆19Updated 4 years ago
- prebuild angr wheels for Windows on x86_64☆15Updated 7 years ago
- General purpose repository for miscellaneous scripts, pcaps and malware IOCs that we share with the info-sec research community☆39Updated 5 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 6 years ago
- Kernel Stack info leak at exportObjectToClient function☆42Updated 6 years ago
- ☆19Updated 3 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 4 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Updated 7 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆50Updated 5 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 4 years ago
- A repository with simple projects created for testing/learning purpose☆46Updated 3 years ago
- IDA Database Importer plugin for Binary Ninja☆37Updated last year
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 8 years ago
- Malware analysis tool based on taint analysis.☆14Updated 3 years ago
- A exe loader that can load NScript evaluation engine of Windows Defender/Microsft Security Essential. You can fuzz NScript by using this.…☆28Updated 8 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆56Updated 6 years ago
- MacOS kernel memory leak (4 bytes)☆30Updated 5 years ago
- Plugins for IDA Pro and Hex-Rays☆46Updated 7 years ago
- A stateful fuzzing engine.☆45Updated 7 years ago