JonathanSalwan / VMNDH-2k12View external linksLinks
Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12
☆39Apr 25, 2013Updated 12 years ago
Alternatives and similar repositories for VMNDH-2k12
Users that are interested in VMNDH-2k12 are comparing it to the libraries listed below
Sorting:
- Pintool to detect Read before Write memory access☆21Mar 20, 2013Updated 12 years ago
- A browser extension to execute custom system-level command after all files are being downloaded☆18Jul 27, 2025Updated 6 months ago
- Some low-level stuff☆109May 19, 2024Updated last year
- Symfony2 < 2.5.4 profiler exploit☆13Sep 30, 2015Updated 10 years ago
- Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.☆12Apr 22, 2015Updated 10 years ago
- Abstract Binary Format Manipulation - ELF, PE and Mach-O format☆119Aug 20, 2015Updated 10 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- Security Advisories and Researches☆15Aug 19, 2014Updated 11 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆54Jun 19, 2016Updated 9 years ago
- A simple test of fuzzing Java with AFL and GCJ☆16Jan 31, 2018Updated 8 years ago
- old code from 2007/2008 which uses split TLB to trace OEP☆16Jun 16, 2018Updated 7 years ago
- ☆15Jul 12, 2020Updated 5 years ago
- ☆27Apr 6, 2018Updated 7 years ago
- PoCs/Examples for my guest post on doar-e☆19Nov 27, 2014Updated 11 years ago
- app.any.run malware submissions client☆17Jan 2, 2020Updated 6 years ago
- Another x86 emulator which likes bochs. But it is much weaker in the functionality. As it is a course project,now we only want to emulat…☆18Jan 5, 2014Updated 12 years ago
- Trace events in real time sessions☆47Aug 25, 2023Updated 2 years ago
- Decompile an x86 exe, and read PE infos.☆19Sep 29, 2018Updated 7 years ago
- Dump mapped PE files from memory to the disk☆20Jun 28, 2019Updated 6 years ago
- Windbg Utility Tools based upon PyKD☆42Sep 9, 2020Updated 5 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆57Aug 17, 2019Updated 6 years ago
- Virtual Machine Introspection (VMI) project☆15Apr 22, 2015Updated 10 years ago
- finals-2014☆20Nov 15, 2016Updated 9 years ago
- Some stuffs for CODE BLUE 2016☆23Oct 26, 2016Updated 9 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- ☆21Nov 7, 2016Updated 9 years ago
- AFL, with scripts to support other architectures.☆97Nov 7, 2018Updated 7 years ago
- Binary reversing tool to find all possible code paths between two functions.☆28Apr 25, 2018Updated 7 years ago
- Hooking Shadow and normal SSDT with Kaspersky Hypervisor and abusing alignment☆26Dec 5, 2020Updated 5 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- ☆11Sep 26, 2021Updated 4 years ago
- I'm going to be dropping code from the XC3 Driver (result of reversing the driver)☆71Jan 31, 2020Updated 6 years ago
- MemoryHacker is a tool which can search for values on the target process!☆22Jul 21, 2016Updated 9 years ago
- C/C++ Source Code Obfuscator☆24Mar 2, 2023Updated 2 years ago
- 어셈블리어를 배워서 써먹자☆21Jun 26, 2018Updated 7 years ago
- Unofficial American Fuzzy Lop repo☆25Aug 5, 2016Updated 9 years ago
- My CTF writeup☆26Mar 20, 2017Updated 8 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Dec 9, 2015Updated 10 years ago
- VMCS Auditor provides almost all of Intel's VMCS Layout checklist based on Bochs Emulator.☆32Dec 7, 2018Updated 7 years ago