SummitRoute / srepp_clientLinks
Summit Route End Point Protection - Client code
☆16Updated 9 years ago
Alternatives and similar repositories for srepp_client
Users that are interested in srepp_client are comparing it to the libraries listed below
Sorting:
- Summit Route End Point Protection - Server code☆12Updated 9 years ago
- RemoteBridge is a library that allows you to access internal COM and JAVA objects used by third-party applications remotely.☆35Updated 8 years ago
- Library and tools to access the Microsoft Internet Explorer (MSIE) Cache File (index.dat) files☆16Updated last year
- Anti-AV compilation☆44Updated 12 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 9 years ago
- The educational Animus malware☆18Updated 6 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Updated 10 years ago
- Identifying and Disrupting Crypto-Ransomware (and Destructive Malware) using handle heurustics☆56Updated 10 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- ☆21Updated 9 years ago
- OllySocketTrace is a plugin for OllyDbg to trace the socket operations being performed by a process.☆63Updated 14 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 10 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Updated 9 years ago
- Server for receiving autorun data from the clients☆13Updated 8 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆50Updated 11 months ago
- ☆30Updated 8 years ago
- Ambush Host Intrusion Prevention System☆65Updated 12 years ago
- vstruct based dissectors for various file/protocol formats☆15Updated 8 years ago
- MyDLP Windows Endpoint Filter☆37Updated 12 years ago
- a collection of yara rules for binary analysis☆24Updated 8 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 9 years ago
- Random Code Store☆17Updated 2 years ago
- x64 Windows Software Fault Injection Tool☆17Updated 7 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 11 years ago
- DEPRECATED - replaced with "monitor"☆122Updated 9 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- Elevation by environment variable expansion☆65Updated 8 years ago
- IDATACO IDA Pro Plugin☆47Updated 9 years ago
- Private set of tools for game hacking☆12Updated 10 years ago