K2 / RelocLinks
Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries and ensure a cryptographically secure hash match for code running on your legacy systems. A client tool that downloads relocation data for various PE files. This ensures when extracting data from memory dump…
☆11Updated 9 years ago
Alternatives and similar repositories for Reloc
Users that are interested in Reloc are comparing it to the libraries listed below
Sorting:
- Summit Route End Point Protection - Client code☆17Updated 9 years ago
- RemoteBridge is a library that allows you to access internal COM and JAVA objects used by third-party applications remotely.☆34Updated 7 years ago
- x64 Windows Software Fault Injection Tool☆17Updated 7 years ago
- ☆28Updated 8 years ago
- ☆28Updated 3 years ago
- IDAPython script in order to auto-rename subs☆20Updated 8 years ago
- Tool to resolve symbols by the address of the binary☆15Updated 6 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Updated 13 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 9 years ago
- vstruct based dissectors for various file/protocol formats☆15Updated 7 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36Updated 9 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- IDApro idc and idapython script collection☆28Updated last year
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Updated 7 years ago
- The educational Animus malware☆18Updated 5 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- ☆14Updated 9 years ago
- Private set of tools for game hacking☆12Updated 10 years ago
- HeapsAboutCorruption - set of implementation / demonstration public heap specific exploit techniques, enjoy!☆13Updated 11 years ago
- Microsoft Edge MemGC Internals☆17Updated 9 years ago
- Packed Malware Analyzer (PACKMAN)☆12Updated 9 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- python inspect rootkit tool☆33Updated 11 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- Collection of IDA Pro plugins I wrote over the years☆23Updated 15 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆41Updated 12 years ago
- Internet Explorer MemoryProtection Mitigation☆32Updated 11 years ago
- Anti-AV compilation☆44Updated 11 years ago
- Misc Python tools or PoCs. Mainly focused in helping RE, fuzzing☆20Updated 12 years ago
- Malware analyses and helpful scripts☆29Updated 3 years ago