blaquee / DbgFlashVulLinks
DbgFlashVul
☆12Updated 10 years ago
Alternatives and similar repositories for DbgFlashVul
Users that are interested in DbgFlashVul are comparing it to the libraries listed below
Sorting:
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Updated 7 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆15Updated 10 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago
- ☆22Updated 8 years ago
- API logger plugin for Intel Pintool☆14Updated 8 years ago
- reversed emet tool☆24Updated 13 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Updated 9 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Updated 8 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 7 years ago
- Demos presented on Hackerfest 2015☆14Updated 10 years ago
- ☆13Updated 8 years ago
- Slides of 44Con 2018☆22Updated 7 years ago
- ☆14Updated 7 years ago
- ☆12Updated 8 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Updated 10 years ago
- ☆11Updated 11 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Updated 10 years ago
- ☆30Updated 8 years ago
- wow64 syscall filter☆13Updated 11 years ago
- Expression generator for WebAssembly☆18Updated 7 years ago
- Dynamic binary analysis via platform emulation☆12Updated 7 years ago
- ☆12Updated 8 years ago
- 虚拟机逃逸exp工具 VMware Escape Exploit before VMware WorkStation 12.5.5☆10Updated 8 years ago
- ☆11Updated 10 years ago
- Windows device tree walker☆15Updated 7 years ago
- Microsoft Edge MemGC Internals☆17Updated 10 years ago
- ShellcodeVM☆15Updated 9 years ago
- Using SEH to bypass CFG☆30Updated 8 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Updated 13 years ago
- Common Malware Techniques☆13Updated 2 years ago