Vector35 / HackingGamesLinks
Hacking Games in a Hacked Game
☆28Updated 10 years ago
Alternatives and similar repositories for HackingGames
Users that are interested in HackingGames are comparing it to the libraries listed below
Sorting:
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- ☆24Updated 8 years ago
- Ida Pro Ultimate Qt Build Guide☆27Updated 6 years ago
- Private set of tools for game hacking☆12Updated 10 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Binary Analysis Platform☆74Updated 11 years ago
- Small script to assemble/disassemble from CLI☆22Updated 3 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆50Updated 10 months ago
- Imports Reconstructor☆31Updated 9 years ago
- A tiny hacking framework for the PwnAdventure3: Pwnie Island game created by http://ghostintheshellcode.com/ ( http://pwnadventure.com/ )☆26Updated 10 years ago
- ☆26Updated 3 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Updated 9 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 11 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 8 years ago
- Collection of scripts that were once useful for reverse engineering things☆75Updated 15 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 9 years ago
- This is the python wrapper for The Security Framework SRDF☆49Updated 11 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit using GDI☆19Updated 8 years ago
- Tool to analyze 64-bit binaries with 32-bit Hex-Rays Decompiler☆80Updated 10 years ago
- ☆15Updated 5 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 10 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆93Updated 9 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆70Updated 10 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Updated 11 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 10 years ago