GeoSn0w / HexifyLinks
A quick String < - > HEX tool for Windows with Drag & Drop and File saving
☆12Updated 6 years ago
Alternatives and similar repositories for Hexify
Users that are interested in Hexify are comparing it to the libraries listed below
Sorting:
- ☆14Updated 7 years ago
- Dynamic binary analysis via platform emulation☆12Updated 7 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Updated 7 years ago
- Kernel Stack info leak at exportObjectToClient function☆42Updated 6 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆14Updated 6 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 6 years ago
- Windows build files for the VMHunt Intel PIN Trace tool☆19Updated 6 years ago
- hook detector using emulation and comparing static with dynamic outputs☆17Updated 2 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- Dalvik Header Plugin for IDA Pro☆22Updated 12 years ago
- A C/C++ code obfuscator based on llvm/clang technology☆16Updated 10 years ago
- ☆12Updated 7 years ago
- CVE-2018-4280: Mach port replacement vulnerability in launchd on macOS 10.13.5 leading to local privilege escalation and SIP bypass.☆59Updated 6 years ago
- ☆13Updated 8 years ago
- Windows device tree walker☆15Updated 6 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Updated 11 years ago
- IDA反-反调试插件 IDAStealth v1.3.3, created 06/28/2011, Jan Newger☆21Updated 7 years ago
- User-mode part of Zerokit platform☆22Updated 6 years ago
- IDA2PAT_Reloaded for windows and mac osx☆13Updated 7 years ago
- Kernel Shellcode to add all privileges in token☆14Updated 8 years ago
- iOS 12.0 -> 12.1.2 _kernproc and _rootvnode offsets for 16K devices☆11Updated 6 years ago
- iOS 11.1.2 kernel exploit and PoC local kernel debugger by @i41nbeer (https://bugs.chromium.org/p/project-zero/issues/detail?id=1417)☆32Updated 7 years ago
- ☆12Updated 7 years ago
- Demos presented on Hackerfest 2015☆14Updated 9 years ago
- ☆22Updated 8 years ago
- A collection of tools for injecting DSOs in processes under various operating systems☆50Updated 2 years ago
- IDA loader for Apple SecureROM☆13Updated 5 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Updated 9 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago
- DbgFlashVul☆12Updated 9 years ago