blaquee / memdumpLinks
memdump allows you to dump processes memory at any given time and view its contents. Most programs store critical information in memory that may lead to security breaches. This memory dumper searches for the heap locations of a given PID and dumps the data to a file.
☆19Updated 11 years ago
Alternatives and similar repositories for memdump
Users that are interested in memdump are comparing it to the libraries listed below
Sorting:
- Dalvik Header Plugin for IDA Pro☆22Updated 12 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- The PoC implementations for the Android code packing technique.☆12Updated 8 years ago
- My manual analysis of malware families☆13Updated 8 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 3 months ago
- Collection of IDA Pro plugins I wrote over the years☆23Updated 15 years ago
- Misc IDA Pro scripts☆24Updated 8 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- Analysis and Modification Tool for Executables☆17Updated 6 years ago
- If you want to exploit some kernel overflows, I've designed (long time ago) several levels ; have fun!☆8Updated 13 years ago
- Scripts targeting specific families☆13Updated 8 years ago
- Cross-Qt compatibility module for IDAPython.☆13Updated 5 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 9 years ago
- A tool pulls loaded binaries ordered by memory regions☆34Updated 5 years ago
- ☆13Updated 8 years ago
- Scripts for x64dbg to find the OEP of exe files packed with UPX☆14Updated 7 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Updated 4 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 7 years ago
- Google maps http and ip lookup for ida pro☆13Updated 6 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Updated 8 years ago
- Zero Wine Tryouts: An open source malware analysis tool☆17Updated 9 years ago
- IDA loader module for Hidden Bee's custom executable file format☆20Updated 6 years ago
- Random Code Store☆17Updated 2 years ago
- ☆30Updated 9 years ago
- Malware analyses and helpful scripts☆29Updated 3 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 7 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 3 years ago
- reverse engineering, visual binary analysis☆24Updated 8 years ago
- 🕵️ The crappy, magical string Java/Android decrypter☆11Updated 5 years ago