Fare9 / Genaytyk-VM
My notes about Genyatyk VM crackme
☆26Updated 4 years ago
Alternatives and similar repositories for Genaytyk-VM:
Users that are interested in Genaytyk-VM are comparing it to the libraries listed below
- ☆45Updated 4 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆48Updated 4 years ago
- The place where my HackSys Extreme Vulnerable Driver exploits go.☆25Updated 6 years ago
- IDA script for vmprotect Windows Api address decoder☆51Updated 3 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆52Updated 5 years ago
- ☆33Updated 3 years ago
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆22Updated 2 years ago
- Collects extended function properties from IDA Pro databases☆93Updated 4 years ago
- ☆33Updated 2 years ago
- Analysis of VBS exploit CVE-2018-8174☆31Updated 6 years ago
- ☆28Updated 4 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆43Updated last year
- Tools for instrumenting Windows Defender's mpengine.dll☆36Updated 6 years ago
- Flare-On solutions☆36Updated 5 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 3 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Updated 7 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆41Updated 5 years ago
- An Integrity-Check Monitoring Pintool☆56Updated 4 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 4 years ago
- PoC for CVE-2017-0075☆37Updated 5 years ago
- ☆76Updated 3 years ago
- Python based angr plug in for IDA Pro.☆34Updated 7 years ago
- My conference presentations and publications☆26Updated 3 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- Create and use macros in IDA's CLIs☆64Updated last year
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- A static analysis tool that helps security researchers scan a list of Windows kernel drivers for common vulnerability patterns in drivers…☆54Updated 3 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- expansion of afl-unicorn using c++☆28Updated 5 years ago