Invodex / Ninja_DumperLinks
☆12Updated last year
Alternatives and similar repositories for Ninja_Dumper
Users that are interested in Ninja_Dumper are comparing it to the libraries listed below
Sorting:
- ☆39Updated last year
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 10 months ago
- ☆55Updated 7 years ago
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆96Updated 2 months ago
- Binary Exploitation Phrack CTF Challenge☆139Updated 4 months ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- Tool to start a python http server in a simple way☆10Updated 3 years ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆83Updated 5 months ago
- ☆89Updated 10 months ago
- Recon 2023 slides and code☆80Updated 2 years ago
- A comprehensive Hypervisor resources repo☆187Updated 2 months ago
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆64Updated last year
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆53Updated 2 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 5 months ago
- Leveraging patch diffing to discover new vulnerabilities☆137Updated last year
- Solutions and writeups for the Flare-On 11 (2024) reverse engineering challenge☆71Updated last year
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121Updated last year
- Vibe Malware Triage - MCP server for static PE analysis.☆74Updated last month
- ☆64Updated last year
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆51Updated 2 years ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆127Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- A journal for $6,000 Riot Vanguard bounty.☆67Updated 2 years ago
- ☆29Updated 3 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆123Updated 3 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆29Updated last year
- Dreg's setup for lldb reversing. The simplest and easiest possible, without scripting. lldb debugging setup.☆14Updated last year
- Payload Obfuscation for Red Teams workshop materials☆78Updated last month
- ☆21Updated last year