MaKiPL / ASLR_disablerLinks
Disables ASLR flag IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE in IMAGE_OPTIONAL_HEADER on pre-compiled EXE. Works for both 32 and 64 bit Windows EXE/PE images
☆20Updated 4 years ago
Alternatives and similar repositories for ASLR_disabler
Users that are interested in ASLR_disabler are comparing it to the libraries listed below
Sorting:
- Ghidra consonance and make it more ida-ish☆16Updated 6 years ago
- [F]aster [U]niversal [U]npacker☆58Updated 12 years ago
- bunch of random stuff☆21Updated 5 years ago
- Blog series about Pwn Adventure 3: http://blog.keyidentity.com/tag/pwnadventure/☆38Updated 8 years ago
- Extract annoations from Ghidra into an X32/X64 dbg database☆57Updated 4 years ago
- General purpose repository for miscellaneous scripts, pcaps and malware IOCs that we share with the info-sec research community☆39Updated 5 years ago
- It does the same thing as plugin FunctionStringAssociate for IDA, Now the script just works, in the future it is planned to increase the …☆57Updated 2 years ago
- Import an x64dbg database into a Ghidra Project☆22Updated 6 years ago
- Some of the Anti-Debugging Tricks☆28Updated 8 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 4 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Yara sort☆13Updated this week
- Control Flow Guard Teleportation demo☆23Updated 6 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 6 years ago
- My open source Ghidra scripts☆48Updated 6 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆111Updated 5 years ago
- Experiments on C/C++ Exploits☆22Updated 5 years ago
- A project in Golang that will create prefix-based magic MD5 hashes for type juggling.☆20Updated 7 years ago
- Exploiting CVE-2016-4657 to JailBreak the Nintendo Switch☆56Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 9 years ago
- Large Scale Cumulative Binary Diffing.☆25Updated 7 years ago
- Demos for Presentation on Windows Runtime Security☆70Updated 7 years ago
- A git history of Windows filesystems☆76Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆56Updated 6 years ago
- Collection of my slide decks☆109Updated 5 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 6 years ago
- ☆36Updated 6 years ago
- ☆32Updated last year