Vector35 / HackingGamesLinks
Hacking Games in a Hacked Game
☆29Updated 10 years ago
Alternatives and similar repositories for HackingGames
Users that are interested in HackingGames are comparing it to the libraries listed below
Sorting:
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- ☆23Updated 8 years ago
- Ida Pro Ultimate Qt Build Guide☆27Updated 7 years ago
- Imports Reconstructor☆31Updated 9 years ago
- ☆71Updated 4 years ago
- Tool to analyze 64-bit binaries with 32-bit Hex-Rays Decompiler☆79Updated 11 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 11 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆97Updated 9 years ago
- Private set of tools for game hacking☆12Updated 11 years ago
- Small script to assemble/disassemble from CLI☆23Updated 3 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- A few IDAPython scripts to generate class hierarchy diagrams from IDBs☆35Updated 14 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆48Updated last year
- Tools, documentation and scripts to move projects from IDA to R2 and viceversa☆135Updated 6 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 10 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit using GDI☆19Updated 8 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Updated 10 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Updated 10 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- ☆52Updated 9 years ago
- Maintaining an official release at http://split-code.com/cda.html . Tool for recording, filtering, and hacking function calls within appl…☆68Updated 11 years ago
- ☆15Updated 5 years ago
- This is the python wrapper for The Security Framework SRDF☆49Updated 11 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 8 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆91Updated 9 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 10 years ago
- Translate regular Assembly into Extended Instructions☆88Updated 13 years ago
- Another radare2 gui for windows☆39Updated 8 years ago
- A Reverse-Engineer's best friend.☆71Updated 8 years ago