Heurs / parseNTFSLinks
Simple NTFS crawler.
☆56Updated 8 years ago
Alternatives and similar repositories for parseNTFS
Users that are interested in parseNTFS are comparing it to the libraries listed below
Sorting:
- ☆36Updated 8 years ago
- ☆35Updated 10 years ago
- kernel exploitation helper class☆77Updated 9 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Updated 4 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- Analysis PE file or Shellcode☆50Updated 9 years ago
- QEMU with rVMI extensions☆25Updated 8 years ago
- ASERT shared scripts for reversing☆32Updated 7 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- ☆26Updated 9 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆57Updated 8 years ago
- ☆22Updated 8 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago
- ☆43Updated 7 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 11 years ago
- ☆39Updated 4 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆43Updated 9 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 9 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 10 years ago
- A fuzz job for ClamAV☆32Updated 9 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Updated 7 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- ransomware_begone☆42Updated 9 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Updated 8 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- IDATACO IDA Pro Plugin☆47Updated 9 years ago
- Imports MSDN documentation into IDA Pro☆52Updated 13 years ago