SummitRoute / srepp_clientLinks
Summit Route End Point Protection - Client code
☆17Updated 9 years ago
Alternatives and similar repositories for srepp_client
Users that are interested in srepp_client are comparing it to the libraries listed below
Sorting:
- Summit Route End Point Protection - Server code☆12Updated 9 years ago
- RemoteBridge is a library that allows you to access internal COM and JAVA objects used by third-party applications remotely.☆35Updated 7 years ago
- Anti-AV compilation☆44Updated 11 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- Elevation by environment variable expansion☆65Updated 8 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 10 years ago
- Run executables from the Windows registry☆16Updated 3 years ago
- The educational Animus malware☆18Updated 5 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 9 years ago
- ☆21Updated 9 years ago
- Sample libraries to be used with IAT Patcher☆34Updated 2 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆11Updated 9 years ago
- Generate RSA keys, encrypt and decrypt data☆24Updated 4 years ago
- OllySocketTrace is a plugin for OllyDbg to trace the socket operations being performed by a process.☆62Updated 13 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Updated 9 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 8 years ago
- MyDLP Windows Endpoint Filter☆35Updated 11 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆50Updated 9 months ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆40Updated 11 years ago
- zer0m0n driver for cuckoo sandbox☆24Updated 10 years ago
- Identifying and Disrupting Crypto-Ransomware (and Destructive Malware) using handle heurustics☆56Updated 10 years ago
- Internet Explorer MemoryProtection Mitigation☆32Updated 11 years ago
- s(4)u for Windows☆48Updated 4 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- ☆28Updated 8 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- Tool to resolve symbols by the address of the binary☆15Updated 6 years ago
- Private set of tools for game hacking☆12Updated 10 years ago