SummitRoute / srepp_clientLinks
Summit Route End Point Protection - Client code
☆16Updated 9 years ago
Alternatives and similar repositories for srepp_client
Users that are interested in srepp_client are comparing it to the libraries listed below
Sorting:
- Summit Route End Point Protection - Server code☆12Updated 9 years ago
- RemoteBridge is a library that allows you to access internal COM and JAVA objects used by third-party applications remotely.☆35Updated 8 years ago
- Anti-AV compilation☆44Updated 12 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Updated 9 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 9 years ago
- The educational Animus malware☆18Updated 6 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 10 years ago
- Identifying and Disrupting Crypto-Ransomware (and Destructive Malware) using handle heurustics☆56Updated 10 years ago
- Elevation by environment variable expansion☆65Updated 9 years ago
- ☆21Updated 9 years ago
- Library and tools to access the Microsoft Internet Explorer (MSIE) Cache File (index.dat) files☆16Updated this week
- Run executables from the Windows registry☆16Updated 3 years ago
- Private set of tools for game hacking☆12Updated 10 years ago
- s(4)u for Windows☆48Updated 4 years ago
- OllySocketTrace is a plugin for OllyDbg to trace the socket operations being performed by a process.☆63Updated 14 years ago
- ☆52Updated 9 years ago
- MyDLP Windows Endpoint Filter☆37Updated 12 years ago
- ☆30Updated 8 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- Sample libraries to be used with IAT Patcher☆36Updated 3 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆50Updated last year
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 9 years ago
- A PowerShell binding for the Unicorn Engine☆17Updated 9 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Updated 10 years ago
- zer0m0n driver for cuckoo sandbox☆24Updated 10 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- A collection of tools mostly written in Python.☆15Updated 10 years ago
- Parses MSDN documentation into an XML file☆31Updated 13 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36Updated 9 years ago