SummitRoute / srepp_clientLinks
Summit Route End Point Protection - Client code
☆16Updated 9 years ago
Alternatives and similar repositories for srepp_client
Users that are interested in srepp_client are comparing it to the libraries listed below
Sorting:
- Summit Route End Point Protection - Server code☆12Updated 9 years ago
- RemoteBridge is a library that allows you to access internal COM and JAVA objects used by third-party applications remotely.☆35Updated 8 years ago
- Library and tools to access the Microsoft Internet Explorer (MSIE) Cache File (index.dat) files☆16Updated last year
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Updated 9 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 9 years ago
- The educational Animus malware☆18Updated 6 years ago
- Anti-AV compilation☆44Updated 12 years ago
- Identifying and Disrupting Crypto-Ransomware (and Destructive Malware) using handle heurustics☆56Updated 10 years ago
- ☆21Updated 9 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- Elevation by environment variable expansion☆65Updated 8 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Updated 2 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Updated 9 years ago
- Server for receiving autorun data from the clients☆13Updated 8 years ago
- Run executables from the Windows registry☆16Updated 3 years ago
- ☆52Updated 9 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 9 years ago
- Private set of tools for game hacking☆12Updated 10 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- IDATACO IDA Pro Plugin☆47Updated 9 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆40Updated 11 years ago
- zer0m0n driver for cuckoo sandbox☆24Updated 10 years ago
- x64 Windows Software Fault Injection Tool☆17Updated 7 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆50Updated 10 months ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 10 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Updated 7 years ago
- DEPRECATED - replaced with "monitor"☆122Updated 9 years ago
- ☆28Updated 8 years ago