armadito / armadito-mod-pdfLinks
Armadito module for PDF document analysis.
☆18Updated 8 years ago
Alternatives and similar repositories for armadito-mod-pdf
Users that are interested in armadito-mod-pdf are comparing it to the libraries listed below
Sorting:
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 9 years ago
- ☆16Updated 9 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆57Updated 8 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 7 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 9 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 10 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 10 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- KIMS Multi AV Scanner by DSR!☆31Updated 5 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- All related files and slides for past talks☆44Updated 2 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- The plugin is an integration of Virus Battle API to the well known IDA Disassembler.☆20Updated 10 years ago
- ☆24Updated 10 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Linux-KVM with rVMI extensions☆22Updated 8 years ago
- Fuzzer☆43Updated 11 years ago
- ☆25Updated 10 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆55Updated 9 years ago
- Binary Analysis Platform☆74Updated 12 years ago
- ☆26Updated 9 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago
- LPE exploits for Secret Net and Secret Net Studio☆51Updated 9 years ago
- ☆32Updated last year
- Windows Crypt API hook to generate weak keys☆47Updated 9 years ago
- Set of python scripts to analyse PE32/PE64 binaries and to extract VB 5/6 headers and Visual Basic p-code functions.☆48Updated 10 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago