KasperskyLab / VBscriptInternals
Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis
☆84Updated 2 years ago
Alternatives and similar repositories for VBscriptInternals:
Users that are interested in VBscriptInternals are comparing it to the libraries listed below
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆89Updated 5 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 5 years ago
- FLARE Kernel Shellcode Loader☆176Updated 5 years ago
- Simple library to spray the Windows Kernel Pool☆107Updated 5 years ago
- Some example source code for fixed IE11 sandbox escapes.☆139Updated 10 years ago
- ☆99Updated 8 months ago
- ☆113Updated 8 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆93Updated 3 years ago
- Parsers for custom malware formats ("Funky malware formats")☆93Updated 3 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆119Updated 4 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆181Updated 4 years ago
- zer0m0n driver for cuckoo sandbox☆87Updated 8 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆180Updated 5 years ago
- Windows NT ioctl bruteforcer and modular fuzzer☆121Updated 6 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆61Updated 7 years ago
- WinHeap Explorer repository.☆119Updated 6 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆72Updated 5 years ago
- ☆26Updated 10 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- kernel pool windbg extension☆80Updated 9 years ago
- ☆33Updated 9 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 5 years ago
- libemu shim layer and win32 environment for Unicorn Engine☆71Updated 7 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆67Updated 6 years ago
- PEDA-like debugger UI for WinDbg☆202Updated 10 months ago
- IDA Plugin which decodes Windows Device I/O control code into DeviceType, FunctionCode, AccessType and MethodType.☆107Updated last year
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆74Updated 10 years ago
- Flare-On solutions☆36Updated 5 years ago