ax330d / exports-plus
IDA Pro plugin to view Exports
☆17Updated 6 years ago
Alternatives and similar repositories for exports-plus:
Users that are interested in exports-plus are comparing it to the libraries listed below
- Dalvik Header Plugin for IDA Pro☆21Updated 12 years ago
- wow64 syscall filter☆13Updated 10 years ago
- Flash Exploit Detector☆7Updated 9 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 8 years ago
- ☆12Updated 10 years ago
- ☆12Updated 7 years ago
- Fetch and set configuration values from IDAPython scripts☆20Updated 4 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 4 years ago
- ☆22Updated 6 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- ☆22Updated 7 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Updated 10 years ago
- ☆17Updated 6 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆41Updated 11 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- ☆28Updated 7 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆10Updated 8 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- ☆16Updated 5 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 6 years ago
- black hat Asia 2017 Slides☆22Updated 8 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- ☆12Updated 7 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- NoREpls - Application designed for the purposes of reverse engineering.☆11Updated 6 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Updated 9 years ago
- Solutions for various crackmes☆20Updated 12 years ago
- Ida Plugin to Use the Awsome Scylla plugin☆21Updated 9 years ago
- Tools that run inside the guest☆12Updated 5 years ago