Invodex / Ninja_Dumper
☆12Updated 11 months ago
Alternatives and similar repositories for Ninja_Dumper:
Users that are interested in Ninja_Dumper are comparing it to the libraries listed below
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆29Updated 2 years ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆106Updated 6 months ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆116Updated 4 months ago
- Recon 2023 slides and code☆79Updated last year
- General malware analysis stuff☆36Updated 7 months ago
- Python tool to resolve all strings in Go binaries obfuscated by garble☆70Updated last month
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆114Updated 10 months ago
- Binary Golf Grand Prix☆53Updated 2 weeks ago
- Resolve symbols from release rust binaries on Windows☆20Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated 3 weeks ago
- Windows 11 Syscall table. Ready to use in direct syscall. Actively maintained.☆22Updated 3 years ago
- ☆23Updated 2 months ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- Collection of codes focused on Linux rootkits☆95Updated last month
- ☆18Updated last year
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆50Updated 2 weeks ago
- Userland exec PoC to be used as attack vector technique☆82Updated last month
- ☆88Updated last month
- Analysis of the vulnerability☆50Updated last year
- A Reflective Loader for macOS☆98Updated 3 months ago
- rpv-web is a browser based frontend for the rpv library☆24Updated this week
- A few examples of how to trap virtual memory access on Windows.☆28Updated 3 months ago
- ☆97Updated 4 months ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆47Updated 4 months ago
- ☆147Updated last year
- API and CLI tool to fetch and query Chome DevTools heap snapshots (Python & Playwright)☆14Updated 10 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆54Updated 3 months ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆54Updated 2 years ago