andreafioraldi / angr-win64-wheelsLinks
prebuild angr wheels for Windows on x86_64
☆15Updated 7 years ago
Alternatives and similar repositories for angr-win64-wheels
Users that are interested in angr-win64-wheels are comparing it to the libraries listed below
Sorting:
- ☆38Updated 3 years ago
- PoC for CVE-2017-0075☆37Updated 6 years ago
- ☆34Updated 4 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Updated 7 years ago
- Analysis of VBS exploit CVE-2018-8174☆31Updated 7 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code☆37Updated 5 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Updated 9 years ago
- My conference presentations and publications☆26Updated 3 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Updated 7 years ago
- Windows syscall fuzzer that I used in 2017 & 2018. Not much to say about it but maybe helpful to someone. At least syscall information it…☆20Updated 6 years ago
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆57Updated 5 years ago
- AllMemPro☆46Updated 8 years ago
- Malware analysis tool based on taint analysis.☆14Updated 3 years ago
- ☆49Updated 5 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 4 years ago
- Slides of 44Con 2018☆22Updated 7 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- IDA script for vmprotect Windows Api address decoder