andreafioraldi / angr-win64-wheelsView external linksLinks
prebuild angr wheels for Windows on x86_64
☆15Jul 21, 2018Updated 7 years ago
Alternatives and similar repositories for angr-win64-wheels
Users that are interested in angr-win64-wheels are comparing it to the libraries listed below
Sorting:
- ☆17Mar 29, 2021Updated 4 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- Procmonel is Procmon like monitoring system implemented using Microsoft WDK☆12Dec 25, 2019Updated 6 years ago
- Miscellaneous Code and Docs☆84Jul 12, 2025Updated 7 months ago
- Example for PagedOut!☆25Oct 22, 2019Updated 6 years ago
- Repository of the findings found by wtf when fuzzing IDA75.☆86Aug 2, 2021Updated 4 years ago
- IRPT: The Art, Science, and Engineering of Windows driver fuzzing☆21Mar 26, 2021Updated 4 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Aug 25, 2017Updated 8 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- ☆25May 27, 2025Updated 8 months ago
- Zydis Python Bindings (Work In Progress)☆32Dec 20, 2021Updated 4 years ago
- Windows builds for use with angr framework☆29Feb 12, 2016Updated 10 years ago
- ☆32Jun 19, 2024Updated last year
- HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators☆37Jan 14, 2022Updated 4 years ago
- Syclover PPT☆30May 22, 2017Updated 8 years ago
- ☆35Mar 20, 2021Updated 4 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆281Jul 22, 2020Updated 5 years ago
- Helper idapython code for reversing kmdf drivers☆74Jul 20, 2022Updated 3 years ago
- DotNext 2019 St. Petersburg Talk Demos☆39May 16, 2019Updated 6 years ago
- Silent installer☆30Jul 6, 2015Updated 10 years ago
- A survey by the SEASON lab on symbolic execution tools and techniques. The survey has appeared in ACM CSUR in 2018.☆84May 3, 2018Updated 7 years ago
- Droppers for all platforms☆30Jul 6, 2015Updated 10 years ago
- A log4shell detector using ProGuardCORE☆10Aug 5, 2022Updated 3 years ago
- [SPOILER ALERT] My attempt at tackling the x86_64 asm riddles in xorpd's xchg rax,rax book. Pull requests welcome.☆92Nov 8, 2025Updated 3 months ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆90Feb 14, 2019Updated 7 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆85Jun 1, 2022Updated 3 years ago
- JavaScript Engine Exploits in CTF☆39Oct 30, 2018Updated 7 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Nov 1, 2018Updated 7 years ago
- NT AUTHORITY\SYSTEM☆43Jul 8, 2020Updated 5 years ago
- A controlled environment for demonstrating and understanding buffer overflow vulnerabilities in web applications. This project is designe…☆24Jan 27, 2025Updated last year
- Bootkits Revisited☆40Jun 3, 2014Updated 11 years ago
- Using the power of AI to explain and debug source code☆10Jul 10, 2023Updated 2 years ago
- Decrypt String in classes.dex without decompile☆30May 26, 2021Updated 4 years ago
- A Windows kernel driver unit testing framework. Provides a macro free modern cpp syntax. Includes tools for automatic running on your vm.☆11May 15, 2023Updated 2 years ago
- ☆13Mar 28, 2024Updated last year
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 5 months ago
- ☆12Aug 1, 2025Updated 6 months ago
- Returns a HTTP proxy server from a SOCKS5 proxy like Tor☆10Aug 4, 2018Updated 7 years ago