RolfRolles / wbDESHookView external linksLinks
DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)
☆43Nov 6, 2017Updated 8 years ago
Alternatives and similar repositories for wbDESHook
Users that are interested in wbDESHook are comparing it to the libraries listed below
Sorting:
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22May 31, 2017Updated 8 years ago
- ☆34Sep 22, 2017Updated 8 years ago
- IDA2PAT_Reloaded for windows and mac osx☆13Sep 28, 2017Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- A CrackMe powered with a virtual machine.☆43Apr 13, 2015Updated 10 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- iOS_7.0_设备工具☆11May 23, 2017Updated 8 years ago
- Code Morphing pass for LLVM☆24Nov 12, 2016Updated 9 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- Windows inject☆16Jun 7, 2018Updated 7 years ago
- ☆24Sep 26, 2017Updated 8 years ago
- Android runtime jit binary file parser☆13Dec 20, 2017Updated 8 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- LD_PRELOAD magic for Android's AssetManager☆82Jun 6, 2022Updated 3 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 7 years ago
- PoC for CVE-2020-1015☆39May 16, 2020Updated 5 years ago
- Demo: Anti Anti-Debug in iOS Kernel☆74Nov 29, 2017Updated 8 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Nov 28, 2017Updated 8 years ago
- Name substitution plugin for IDA Pro☆146Jun 29, 2017Updated 8 years ago
- A project that aims to automatically devirtualize code that has been virtualized using x86virt☆126Dec 3, 2022Updated 3 years ago
- Recover control flow graph from obfuscated codes☆37Jul 18, 2015Updated 10 years ago
- ☆89May 9, 2019Updated 6 years ago
- This tool will help to fix the Mach-O header of iOS kernel which dump from the memory. So that IDA or function symbol-related tools can l…☆23Feb 22, 2017Updated 8 years ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆414Jan 2, 2020Updated 6 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆148Jul 30, 2017Updated 8 years ago
- A pytest module for The Interactive Disassembler and IDAPython; Record and Replay IDAPython API, execute inside IDA or use mockups of IDA…☆47Nov 3, 2018Updated 7 years ago
- ☆54Feb 23, 2018Updated 7 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Mar 25, 2019Updated 6 years ago
- OllyCallTrace is a plugin for OllyDbg to trace the call chain of a thread.☆54Nov 4, 2011Updated 14 years ago
- Using GNU lightning to generate xor deobfuscation at runtime☆28Aug 22, 2017Updated 8 years ago
- Provides a way which you can load a .NET dll/exe from disk, modify/inject IL, and then run the assembly all in memory without modifying t…☆29Mar 31, 2017Updated 8 years ago
- Offline debugger for malware's reverse engineering☆115Jan 21, 2015Updated 11 years ago
- IDA Pro plugin to aid PS4 user mode ELF reverse engineering.☆70Mar 1, 2018Updated 7 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)☆73Jun 5, 2018Updated 7 years ago
- Today Plugin (x64) - A Plugin For x64dbg☆13Jul 17, 2018Updated 7 years ago