NetSPI / PinLinks
Intel pin tools
☆20Updated 8 years ago
Alternatives and similar repositories for Pin
Users that are interested in Pin are comparing it to the libraries listed below
Sorting:
- Windows driver for profiling and debugging ring 3 applications☆52Updated 13 years ago
- OllyHeapTrace is a plugin for OllyDbg to trace the heap operations being performed by a process.☆55Updated 13 years ago
- Process / thread-level system call tracer for Windows 7 / 8 / 2008 / 2012☆21Updated 10 years ago
- Bootkits Revisited☆40Updated 11 years ago
- ☆34Updated 7 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Updated 9 years ago
- Automated library compilation and PDB annotation with CMake and IDA Pro☆22Updated 6 years ago
- ViDi Visual Disassembler (experimental)☆76Updated 2 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36Updated 9 years ago
- Identifying Virtual Table Functions using VTBL IDA Pro Plugin + Deviare Hooking Engine☆97Updated 12 years ago
- x64 Windows Software Fault Injection Tool☆17Updated 7 years ago
- C++ implementation of ssdeep-compatible fast fuzzy hashing☆37Updated 8 years ago
- C++ wrapper for YARA.☆45Updated 5 years ago
- Random tools and things for creating+injecting complex organisms into a process on both the posix and windows platforms. Includes support…☆41Updated this week
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆58Updated 9 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆74Updated 6 years ago
- Sample libraries to be used with IAT Patcher☆34Updated 2 years ago
- Scripts to prepare Windows system for debugging.☆30Updated 4 years ago
- modify binary Portable Executable to hook its export functions☆63Updated 6 years ago
- ☆31Updated 9 years ago
- Open Source Rootkit☆22Updated 8 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Updated 8 years ago
- Set of python scripts to analyse PE32/PE64 binaries and to extract VB 5/6 headers and Visual Basic p-code functions.☆47Updated 10 years ago
- An IdaPython tool for getting syscall's ID and function name from ntdll.dll, user32.dll, and so on.☆12Updated 8 years ago
- libemu shim layer and win32 environment for Unicorn Engine☆72Updated 8 years ago
- Intel PIN rocks☆15Updated 13 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- kernel exploitation helper class☆77Updated 8 years ago
- ☆50Updated 8 years ago