blacknbunny / peanalyzerLinks
Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit
☆100Updated 6 years ago
Alternatives and similar repositories for peanalyzer
Users that are interested in peanalyzer are comparing it to the libraries listed below
Sorting:
- Reflective Polymorphism☆104Updated 7 years ago
- UAC 0Day all day!☆57Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 7 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- ☆43Updated 6 years ago
- ☆52Updated 8 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆99Updated 5 years ago
- Workshop material for a Windows Attack Surface Analysis Workshop☆67Updated 6 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆55Updated 8 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Updated 5 years ago
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆60Updated 8 years ago
- public bugs/proof of concepts☆48Updated 4 years ago
- API functions for Malware Research☆35Updated 6 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆73Updated 5 years ago
- Simple tool to automate adding shellcode to PE files☆49Updated 7 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 8 years ago
- ☆46Updated 5 years ago
- fragments of dirty, and quick code. possible error checking or none.☆24Updated 8 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 10 years ago
- Mixing up CVE and MS like a pro☆25Updated 8 years ago
- ☆98Updated 3 years ago
- POSHSPY backdoor code☆43Updated 8 years ago
- ☆29Updated 8 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆50Updated 7 years ago