blaquee / DbgFlashVulLinks
DbgFlashVul
☆12Updated 10 years ago
Alternatives and similar repositories for DbgFlashVul
Users that are interested in DbgFlashVul are comparing it to the libraries listed below
Sorting:
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Updated 7 years ago
- API logger plugin for Intel Pintool☆14Updated 7 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆15Updated 10 years ago
- ☆13Updated 8 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Updated 9 years ago
- ☆22Updated 8 years ago
- Demos presented on Hackerfest 2015☆14Updated 10 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 8 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 7 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Updated 10 years ago
- Slides of 44Con 2018☆22Updated 7 years ago
- ☆14Updated 7 years ago
- Dynamic binary analysis via platform emulation☆12Updated 7 years ago
- ☆11Updated 11 years ago
- reversed emet tool☆24Updated 13 years ago
- This project has been moved from a private repository☆26Updated 7 years ago
- 虚拟机逃逸exp工具 VMware Escape Exploit before VMware WorkStation 12.5.5☆10Updated 8 years ago
- ☆12Updated 8 years ago
- Windows device tree walker☆15Updated 7 years ago
- ☆12Updated 8 years ago
- Some tools☆10Updated 7 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Updated 10 years ago
- Malware monitor template based on MinHook☆17Updated 10 years ago
- wow64 syscall filter☆13Updated 11 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Updated 11 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 10 years ago
- Automatically exported from code.google.com/p/bypass-x64-dse☆20Updated 10 years ago
- Using SEH to bypass CFG☆29Updated 8 years ago
- ShellcodeVM☆15Updated 9 years ago