Some of the Anti-Debugging Tricks
☆29Feb 20, 2017Updated 9 years ago
Alternatives and similar repositories for Anti-Debug
Users that are interested in Anti-Debug are comparing it to the libraries listed below
Sorting:
- Technical Notes☆16Dec 1, 2017Updated 8 years ago
- Plugins for Scylla☆20Sep 14, 2011Updated 14 years ago
- OpSec in OSINT - An evolving guide on how to stay safe and private during open source intelligence investigations☆21Jul 4, 2017Updated 8 years ago
- Large Scale Cumulative Binary Diffing.☆25Mar 10, 2018Updated 7 years ago
- BitPing A Simple Bitcoin Address Changer From Clipboard☆11Jun 28, 2018Updated 7 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- IDAPython scripts☆15Aug 24, 2017Updated 8 years ago
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- ☆13Jul 11, 2017Updated 8 years ago
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- Pwn2Win CTF 2018 NIZK (Non-Interactive Zero-Knowledge) Platform☆30Dec 2, 2018Updated 7 years ago
- Ring3 Rootkit Backdoor.☆43Jul 20, 2015Updated 10 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 8 years ago
- A different take on Viss's eagleeye project, optimized for use in clouds☆33Apr 19, 2013Updated 12 years ago
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- Plog - A simple and powerful keylogger !☆11Jun 28, 2018Updated 7 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 7 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Apr 9, 2019Updated 6 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- upstream for seccheck☆15Jun 11, 2018Updated 7 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- Hook, DLLInject, PE_Tool☆34Nov 2, 2018Updated 7 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆18Oct 7, 2016Updated 9 years ago
- VNC Reflector is a specialized VNC server which acts as a proxysitting between real VNC server (a host) and a number of VNC clients. It w…☆14Nov 6, 2012Updated 13 years ago
- my little bucket to store the delusions of grandeur I write in python :D☆30Oct 16, 2014Updated 11 years ago
- Linux port scan detector☆13Nov 20, 2017Updated 8 years ago
- Hive solves a critical problem for the malware operators at the CIA.☆66Nov 10, 2017Updated 8 years ago
- Development framework for the BlackArch Linux distribution.☆16May 12, 2020Updated 5 years ago
- Mobile Pentest related stuff☆14Jun 14, 2017Updated 8 years ago
- A large group of assembly language programs & samples ..with different topics and levels..from Ascci to Stack - assembly programming.☆16Jun 24, 2020Updated 5 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 10 years ago
- laboratório sobre buffer overflows☆15Apr 17, 2017Updated 8 years ago
- Deep learning side channel privileged memory reader☆45Jun 28, 2018Updated 7 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- Windows Minifilter driver that redirects any I/O Request of mp3 files to a target file☆18Jul 7, 2015Updated 10 years ago