POC for IAT Parsing Payloads
☆48Jan 1, 2017Updated 9 years ago
Alternatives and similar repositories for IAT_POC
Users that are interested in IAT_POC are comparing it to the libraries listed below
Sorting:
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- Project for the Crypto subject at Uni☆18Dec 26, 2016Updated 9 years ago
- Materials from presentation☆20Jan 18, 2016Updated 10 years ago
- (harmless) mirai botnet client☆14Dec 29, 2016Updated 9 years ago
- Grep-like WinDbg extension☆45Apr 7, 2017Updated 8 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- CVE-2016-0040 Privilege Escalation Exploit For WMI Receive Notification Vulnerability (x86-64)☆14Jun 7, 2018Updated 7 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Aug 4, 2020Updated 5 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago
- Teaching old shellcode new tricks☆209Aug 1, 2017Updated 8 years ago
- softScheck Cloud Fuzzing Framework☆58Jan 26, 2018Updated 8 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- An evolutionary knowledge-based fuzzer☆272May 5, 2024Updated last year
- The first open source vulnerability scanner for firmwares☆197Jul 18, 2016Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆231Jan 18, 2024Updated 2 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- IDAPython plugin for finding Xrefs from a function☆48Jul 14, 2016Updated 9 years ago
- Tools for reverse engineering the Utimaco Firmware☆43Jan 24, 2017Updated 9 years ago
- gdb plugin for android debugging☆103Jun 20, 2016Updated 9 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Comae Hibernation File Decompressor☆156Apr 1, 2023Updated 2 years ago
- Run IDA Pro disassembler in Docker containers for automating, scaling and distributing the use of IDAPython scripts.☆297Nov 23, 2017Updated 8 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Usefull snippets / Computer-security oriented☆20Apr 20, 2017Updated 8 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- NSIS Reversing Suite with IDA Plugins☆112May 15, 2023Updated 2 years ago
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 10 years ago
- Various PoCs☆502Jan 27, 2020Updated 6 years ago