Tera0017 / SDBbot-UnpackerLinks
SDBbot Unpacker Python 2.7
☆9Updated 4 years ago
Alternatives and similar repositories for SDBbot-Unpacker
Users that are interested in SDBbot-Unpacker are comparing it to the libraries listed below
Sorting:
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 7 years ago
- ☆13Updated 7 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 5 years ago
- Hansel - a simple but flexible search for IDA☆25Updated 5 years ago
- Green shellcode challenge tools☆22Updated 6 years ago
- My manual analysis of malware families☆13Updated 7 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Win32k Elevation of Privilege Poc☆1Updated 6 years ago
- BlazeFox Exploit☆18Updated 6 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- My conference presentations and publications☆26Updated 3 years ago
- ☆12Updated 7 years ago
- ☆24Updated 5 years ago
- Experimental Windows .text section Patch Detector☆21Updated 10 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20Updated 6 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆11Updated 9 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 5 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- ☆25Updated 4 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Updated 7 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Updated 6 years ago
- ☆28Updated 8 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Updated 5 years ago
- Common Malware Techniques☆13Updated 2 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 8 years ago
- ☆13Updated 5 years ago
- ☆13Updated 3 years ago