K2 / RelocLinks
Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries and ensure a cryptographically secure hash match for code running on your legacy systems. A client tool that downloads relocation data for various PE files. This ensures when extracting data from memory dump…
☆11Updated 9 years ago
Alternatives and similar repositories for Reloc
Users that are interested in Reloc are comparing it to the libraries listed below
Sorting:
- ☆28Updated 8 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36Updated 9 years ago
- CVE-2014-0816☆25Updated 8 years ago
- Summit Route End Point Protection - Client code☆17Updated 9 years ago
- x64 Windows Software Fault Injection Tool☆17Updated 7 years ago
- Tool to resolve symbols by the address of the binary☆15Updated 6 years ago
- Detours from binaries method entry/exit point to Python scripts (PIN, CPython API)☆31Updated 12 years ago
- IDAPython script in order to auto-rename subs☆20Updated 8 years ago
- Anti-AV compilation☆43Updated 11 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆14Updated 10 years ago
- Collection of IDA Pro plugins I wrote over the years☆23Updated 15 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆41Updated 11 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Updated 13 years ago
- RemoteBridge is a library that allows you to access internal COM and JAVA objects used by third-party applications remotely.☆34Updated 7 years ago
- Simple standalone bundle of NT core APIs☆26Updated 9 years ago
- IDApro idc and idapython script collection☆28Updated last year
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- PIN Tool for monitoring calls and writes from obfuscated code.☆26Updated 5 years ago
- Tiny project with that demonstrates how to enable Return Flow Guard☆12Updated 8 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 9 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- Fetch and set configuration values from IDAPython scripts☆22Updated 4 years ago
- ☆28Updated 3 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆23Updated 12 years ago
- ☆16Updated 7 years ago
- 🐧 A simple kernel-level rootkit☆20Updated 9 years ago
- Private set of tools for game hacking☆12Updated 10 years ago
- x86 Dynamic Binary Translator Library☆34Updated 4 years ago
- Sample libraries to be used with IAT Patcher☆34Updated 2 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago