EXETOOLSNET / RozDll
RozDll by ROZBUD is a Powerful Reverse Engineering Tool that creates Hijacked DLLs and Standard Patchers. RozDll Is used In Software Verification And User Acceptance Testing (UAT). Please use it responsibly And within Legal Boundaries!
☆15Updated 3 weeks ago
Alternatives and similar repositories for RozDll:
Users that are interested in RozDll are comparing it to the libraries listed below
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated last year
- IDA Python deobfuscation script for ConfuserEx binaries☆35Updated 2 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆33Updated last year
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆40Updated 2 months ago
- ☆25Updated 5 months ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆78Updated 8 months ago
- Binary Ninja plugin to deobfuscate strings obfuscated with the Garble project☆14Updated 3 weeks ago
- Simplifier vmp ultra☆15Updated last year
- genpatch is IDA plugin that generates a python script for patching binary☆32Updated last year
- ☆17Updated last month
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆26Updated last year
- Different tools for Microsoft Hyper-V researching☆49Updated 9 months ago
- A post-processing script for TinyTracer☆38Updated 2 years ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆30Updated 9 months ago
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆71Updated 4 months ago
- IDA plugin to deobfuscate emotet CFF☆17Updated 2 years ago
- Report and exploit of CVE-2024-21305.☆35Updated last year
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆26Updated 2 years ago
- Signature finder (from PE-bear)☆36Updated 9 months ago
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆56Updated 11 months ago
- ☆18Updated last year
- ☆16Updated 2 years ago
- IFL - Interactive Functions List (plugin for Binary Ninja)☆23Updated 8 months ago
- ☆12Updated 2 years ago
- Rule Engine for Dynamic Malware Analysis and Research☆16Updated this week
- A journal for $6,000 Riot Vanguard bounty.☆62Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- A few examples of how to trap virtual memory access on Windows.☆28Updated 3 months ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated last year
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 2 years ago