RolfRolles / wbDESHook
DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)
☆39Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for wbDESHook
- Augmenting Static Analysis Using Pintool: Ablation☆39Updated 8 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 7 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆27Updated 8 years ago
- ☆33Updated 9 years ago
- ☆26Updated 8 years ago
- ARM rop chain gadget searcher☆37Updated 7 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆50Updated 8 years ago
- A pin tool to visualise heap operations☆21Updated 9 years ago
- ☆27Updated last year
- REIL translation library☆36Updated 8 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- Reverse Engineering tool for Ethereum EVM☆19Updated 8 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 8 years ago
- Symbolic execution for LLVM traces produced by PANDA☆40Updated 5 years ago
- IDAPython script for quick vulnerability analysis☆33Updated 10 years ago
- Triton based R2 plugin for concolic execution and total control☆30Updated 5 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 7 years ago
- A pure-python win32 debugger interface.☆28Updated 8 years ago
- Plugins for IDA Pro and Hex-Rays☆40Updated 6 years ago
- Augmenting Static Reverse Engineering with Dynamic Analysis and Instrumentation☆131Updated 10 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 7 years ago
- Writeups and solutions for RC3CTF 2016☆14Updated 8 years ago
- kernel exploitation helper class☆75Updated 7 years ago
- A few IDAPython scripts to generate class hierarchy diagrams from IDBs☆34Updated 12 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 8 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 13 years ago
- Tool to view heap chunks and memory writes (using pintool)☆39Updated 5 years ago