ShaneK2 / inVtero.netView external linksLinks
inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extract processes, hypervisors (including nested) in memory dumps using microarchitechture independent Virtual Machiene Introspection techniques
☆294Sep 30, 2023Updated 2 years ago
Alternatives and similar repositories for inVtero.net
Users that are interested in inVtero.net are comparing it to the libraries listed below
Sorting:
- ATrace is a tool for tracing execution of binaries on Windows.☆240Nov 19, 2025Updated 2 months ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- WinDBG Anti-RootKit Extension☆645Jul 29, 2020Updated 5 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆287May 24, 2016Updated 9 years ago
- ☆91Oct 28, 2016Updated 9 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- A branch-monitor-based solution for process monitoring.☆137Feb 9, 2020Updated 6 years ago
- ☆117Nov 11, 2012Updated 13 years ago
- Exploit primitives for PowerShell☆437Mar 25, 2018Updated 7 years ago
- ☆34Sep 22, 2017Updated 8 years ago
- Differential Analysis of Malware in Memory☆216Apr 16, 2017Updated 8 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆438Aug 22, 2018Updated 7 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,046Aug 23, 2021Updated 4 years ago
- Incident Response & Digital Forensics Debugging Extension☆387Dec 11, 2018Updated 7 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Windows SMEP Bypass U=S☆38Apr 8, 2016Updated 9 years ago
- Query and report user logons relations from MS Windows Security Events☆243Aug 9, 2018Updated 7 years ago
- kernel exploitation helper class☆77Nov 26, 2016Updated 9 years ago
- rVMI - A New Paradigm For Full System Analysis☆359Oct 4, 2017Updated 8 years ago
- Various snippets created during malware analysis☆465Oct 3, 2025Updated 4 months ago
- Loading unsigned code into kernel in Windows 10 (64) with help of VMware Workstation Pro/Player design flaw☆141Apr 4, 2017Updated 8 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆48Nov 24, 2024Updated last year
- Grep-like WinDbg extension☆45Apr 7, 2017Updated 8 years ago
- Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone☆324Aug 12, 2019Updated 6 years ago
- Exploit the credentials present in files and memory☆845May 25, 2023Updated 2 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆76Jun 8, 2019Updated 6 years ago
- capstone based disassembler for extracting to binnavi☆229Jun 8, 2016Updated 9 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆265Jul 6, 2017Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆382Apr 17, 2017Updated 8 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Dec 9, 2015Updated 10 years ago
- Artifact analysis tools by JPCERT/CC Analysis Center☆464Aug 14, 2025Updated 6 months ago
- ☆11Mar 11, 2015Updated 10 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆232Jan 18, 2024Updated 2 years ago
- C++ application that uses memory and code hooks to detect packers☆274Mar 5, 2018Updated 7 years ago
- A windbg extension, extracting token related contents☆41Dec 23, 2020Updated 5 years ago
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 9 years ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,680Feb 14, 2024Updated last year