VoidSec / ida-helpers
Collection of IDA helpers
☆15Updated 2 years ago
Alternatives and similar repositories for ida-helpers:
Users that are interested in ida-helpers are comparing it to the libraries listed below
- ☆10Updated 4 years ago
- Using Thread Description To Hide Shellcodes☆14Updated 2 years ago
- Debugger checks in 3 ways☆18Updated 7 years ago
- genpatch is IDA plugin that generates a python script for patching binary☆32Updated last year
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- A tool to show the method info at runtime☆13Updated 5 years ago
- An opensource API hooking framework☆22Updated 5 years ago
- Dump mapped PE files from memory to the disk☆19Updated 5 years ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆22Updated 8 years ago
- Analysis and Modification Tool for Executables☆16Updated 5 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Updated 3 years ago
- Code Integrity Violation Spotter☆16Updated 9 months ago
- Detour hooking IRQ1 ISR through IDT (Interrupt Descriptor Table)☆19Updated last year
- Resources from my journey into Windows binary exploitation☆22Updated 6 years ago
- A tiny Windows hook library for x86/x64☆14Updated last year
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆19Updated 3 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Windows hidden thread suspend POC with code injection☆12Updated 7 years ago
- ☆14Updated 12 years ago
- WinREPL is a "read-eval-print loop" shell on Windows that is useful for testing/learning x86 and x64 assembly.☆13Updated 2 years ago
- Zerokit shared code☆16Updated 5 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆9Updated 2 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16Updated 2 years ago
- ☆18Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- hooking KiUserApcDispatcher☆24Updated 7 years ago
- Hooking Heavens Gate in a weekend☆13Updated 3 years ago
- Given a global name in IDA Pro, find all xrefs which are contained in an exported function.☆11Updated 8 years ago