Heurs / parseNTFSLinks
Simple NTFS crawler.
☆56Updated 8 years ago
Alternatives and similar repositories for parseNTFS
Users that are interested in parseNTFS are comparing it to the libraries listed below
Sorting:
- ☆36Updated 7 years ago
- ☆22Updated 8 years ago
- kernel exploitation helper class☆77Updated 8 years ago
- ☆35Updated 9 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆55Updated 8 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- ☆43Updated 7 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago
- Analysis PE file or Shellcode☆50Updated 9 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆52Updated 7 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- fragments of dirty, and quick code. possible error checking or none.☆24Updated 8 years ago
- QEMU with rVMI extensions☆25Updated 8 years ago
- ASERT shared scripts for reversing☆32Updated 7 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 9 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆43Updated 8 years ago
- ☆26Updated 9 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Updated 8 years ago
- ☆39Updated 4 years ago
- ☆21Updated 6 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- IDATACO IDA Pro Plugin☆47Updated 9 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Malware Sandbox Emulation in Python @ HITCON 2018☆46Updated 7 years ago
- Reflective Polymorphism☆106Updated 7 years ago
- A Python tool to generate ROP chains☆64Updated 6 months ago
- Imports MSDN documentation into IDA Pro☆51Updated 13 years ago