SummitRoute / srepp_clientLinks
Summit Route End Point Protection - Client code
☆16Updated 9 years ago
Alternatives and similar repositories for srepp_client
Users that are interested in srepp_client are comparing it to the libraries listed below
Sorting:
- Summit Route End Point Protection - Server code☆11Updated 9 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Updated 10 years ago
- ☆21Updated 9 years ago
- Anti-AV compilation☆44Updated 12 years ago
- ☆30Updated 8 years ago
- RemoteBridge is a library that allows you to access internal COM and JAVA objects used by third-party applications remotely.☆35Updated 8 years ago
- Library and tools to access the Microsoft Internet Explorer (MSIE) Cache File (index.dat) files☆16Updated last month
- Generate MAEC XML from Ero Carrera's pefile output☆15Updated 8 years ago
- vstruct based dissectors for various file/protocol formats☆15Updated 8 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 10 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 9 years ago
- The educational Animus malware☆18Updated 6 years ago
- ☆52Updated 9 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 10 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Updated 10 years ago
- OllySocketTrace is a plugin for OllyDbg to trace the socket operations being performed by a process.☆63Updated 14 years ago
- Private set of tools for game hacking☆12Updated 11 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Updated 10 years ago
- Analysis PE file or Shellcode☆50Updated 9 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Updated 2 years ago
- Simple NTFS crawler.☆57Updated 8 years ago
- x64 Windows Software Fault Injection Tool☆17Updated 8 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 11 years ago
- Elevation by environment variable expansion☆64Updated 9 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Updated 8 years ago
- Collection of IDA Pro plugins I wrote over the years☆24Updated 15 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Updated 10 years ago
- Identifying and Disrupting Crypto-Ransomware (and Destructive Malware) using handle heurustics☆57Updated 10 years ago
- Modified edition of cuckoomon☆23Updated 6 years ago