Invodex / Ninja_DumperLinks
☆12Updated last year
Alternatives and similar repositories for Ninja_Dumper
Users that are interested in Ninja_Dumper are comparing it to the libraries listed below
Sorting:
- ☆19Updated 2 years ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆109Updated 9 months ago
- Resolve symbols from release rust binaries on Windows☆20Updated last year
- ☆12Updated last year
- Rule Engine for Dynamic Malware Analysis and Research☆23Updated last month
- I/O Cache-As-Ram + AMD x86_64 cache line locking | Mirror of https://codeberg.org/3itch/icekit☆14Updated 2 months ago
- ☆31Updated 3 months ago
- General malware analysis stuff☆37Updated 9 months ago
- ☆18Updated last year
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆48Updated last year
- ☆28Updated 4 months ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- rpv-web is a browser based frontend for the rpv library☆25Updated 3 weeks ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆29Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆54Updated 2 years ago
- This repo for Windows x32-x64 Kernel/Driver/User Mode Exploitation writeups and exploits☆24Updated last year
- Open Source eBPF Malware Analysis Framework☆48Updated 7 months ago
- Recon 2023 slides and code☆79Updated 2 years ago
- Neutralize KEPServerEX anti-debugging techniques☆31Updated 2 years ago
- ☆89Updated 3 months ago
- Slides from various conference talks☆37Updated 2 years ago
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆31Updated 5 months ago
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆25Updated 8 months ago
- Analysis of the vulnerability☆51Updated last year
- DNS over HTTPS targeted malware (only runs once)☆98Updated last year
- Proof-of-concept modular implant platform leveraging v8☆53Updated 3 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆50Updated 2 months ago
- A collection of my reverse engineering and malware analysis write-ups☆20Updated 4 years ago