Make Windows VMs Faster
☆32Jun 30, 2013Updated 12 years ago
Alternatives and similar repositories for OptimizeVM
Users that are interested in OptimizeVM are comparing it to the libraries listed below
Sorting:
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- Download all of Microsoft's security updates and symbols☆41Mar 31, 2016Updated 9 years ago
- ☆64Oct 24, 2015Updated 10 years ago
- A proxy for encrypting TCP connections.☆11Mar 15, 2017Updated 8 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Jul 25, 2014Updated 11 years ago
- browser narlyness☆50Dec 11, 2013Updated 12 years ago
- Fuzzer☆43Oct 18, 2014Updated 11 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- Recon materials☆27Nov 18, 2017Updated 8 years ago
- Crash repro minifier for ASan-instrumented commandline tools.☆12Dec 29, 2019Updated 6 years ago
- ☆12Aug 4, 2015Updated 10 years ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆41Sep 6, 2022Updated 3 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- A Retargettable CFI implementation in LLVM. Authors: Joseph Battaglia and Oulin Yao☆18May 8, 2015Updated 10 years ago
- ☆17Aug 20, 2014Updated 11 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago
- covFuzz☆34Jun 8, 2017Updated 8 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- An intentionally vulnerable Javascript app containing notable vulnerabilities in its dependencies.☆19Jan 26, 2023Updated 3 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Jan 4, 2016Updated 10 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago
- Armadito module for PDF document analysis.☆18Aug 3, 2017Updated 8 years ago
- Windows Kernel Dump Analyzer☆15May 9, 2015Updated 10 years ago
- Docker Container stuffed with Hashicorp Otto, Vagrant and Packer with Virtualbox!☆15Jan 18, 2019Updated 7 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Apr 20, 2016Updated 9 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Oct 23, 2017Updated 8 years ago
- A tool for extracting files from Apple OTA updates as a tarball.☆17Sep 13, 2017Updated 8 years ago
- Windows kernel vulnerability in win32k.sys Driver☆35Dec 6, 2015Updated 10 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- pwning & info gathering via user browser☆39May 7, 2015Updated 10 years ago
- x64 Windows Software Fault Injection Tool☆17Dec 2, 2017Updated 8 years ago
- IDAPython plugin for finding Xrefs from a function☆48Jul 14, 2016Updated 9 years ago
- ☆61Feb 8, 2016Updated 10 years ago
- The collection of programs for evaluating fuzzing techniques☆21Nov 27, 2017Updated 8 years ago
- C definitions processor.☆22Feb 3, 2018Updated 8 years ago
- System call fuzzing of OpenBSD amd64 using TriforceAFL (i.e. AFL and QEMU)☆46Dec 1, 2017Updated 8 years ago