Fare9 / Genaytyk-VM
My notes about Genyatyk VM crackme
☆26Updated 4 years ago
Alternatives and similar repositories for Genaytyk-VM:
Users that are interested in Genaytyk-VM are comparing it to the libraries listed below
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆52Updated 5 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆43Updated last year
- ☆45Updated 4 years ago
- ☆47Updated 2 years ago
- IDA script for vmprotect Windows Api address decoder☆51Updated 3 years ago
- ☆28Updated 4 years ago
- A static analysis tool that helps security researchers scan a list of Windows kernel drivers for common vulnerability patterns in drivers…☆54Updated 3 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆31Updated 6 years ago
- An Integrity-Check Monitoring Pintool☆56Updated 4 years ago
- ☆33Updated 3 years ago
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆22Updated 2 years ago
- ☆76Updated 3 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- Analysis of VBS exploit CVE-2018-8174☆30Updated 6 years ago
- Allows IDA PRO to disassemble x86-64 code (WOW64) in 32-bit database☆25Updated 3 years ago
- Python based angr plug in for IDA Pro.☆34Updated 7 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- ☆40Updated 3 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Updated 7 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆34Updated 3 years ago
- Collects extended function properties from IDA Pro databases☆93Updated 4 years ago
- ☆72Updated 3 years ago
- CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code☆36Updated 4 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆31Updated 9 years ago
- Files for my solution to the SSTIC 2021 challenge☆15Updated 3 years ago
- Breaking Secure Boot with SMM☆40Updated 2 years ago
- The place where my HackSys Extreme Vulnerable Driver exploits go.☆25Updated 6 years ago
- ☆50Updated 7 years ago
- PoC for CVE-2017-0075☆37Updated 5 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 4 years ago