Invodex / Ninja_DumperLinks
☆12Updated last year
Alternatives and similar repositories for Ninja_Dumper
Users that are interested in Ninja_Dumper are comparing it to the libraries listed below
Sorting:
- ☆39Updated last year
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 10 months ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆83Updated 4 months ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- Binary Exploitation Phrack CTF Challenge☆139Updated 3 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆95Updated 2 months ago
- ☆54Updated 7 years ago
- Tool to start a python http server in a simple way☆10Updated 3 years ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆52Updated 2 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 4 months ago
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆27Updated last year
- Vibe Malware Triage - MCP server for static PE analysis.☆73Updated 2 weeks ago
- Recon 2023 slides and code☆80Updated 2 years ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆118Updated last year
- ☆89Updated 10 months ago
- ☆64Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆64Updated last year
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆22Updated 3 years ago
- A journal for $6,000 Riot Vanguard bounty.☆66Updated 2 years ago
- some AV / EDR / analysis studies☆10Updated 2 years ago
- Dreg's setup for lldb reversing. The simplest and easiest possible, without scripting. lldb debugging setup.☆14Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆162Updated 2 weeks ago
- Leveraging patch diffing to discover new vulnerabilities☆137Updated last year
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121Updated last year
- Rule Engine for Dynamic Malware Analysis and Research☆25Updated 8 months ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆118Updated 6 months ago