blaquee / memdumpLinks
memdump allows you to dump processes memory at any given time and view its contents. Most programs store critical information in memory that may lead to security breaches. This memory dumper searches for the heap locations of a given PID and dumps the data to a file.
☆18Updated 12 years ago
Alternatives and similar repositories for memdump
Users that are interested in memdump are comparing it to the libraries listed below
Sorting:
- The PoC implementations for the Android code packing technique.☆13Updated 9 years ago
- Dalvik Header Plugin for IDA Pro☆23Updated 13 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- A tool pulls loaded binaries ordered by memory regions☆35Updated 6 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- My manual analysis of malware families☆13Updated 8 years ago
- IDA loader module for Hidden Bee's custom executable file format☆20Updated 7 years ago
- JEB Scripts☆21Updated 11 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 4 years ago
- Scripts for x64dbg to find the OEP of exe files packed with UPX☆15Updated 8 years ago
- Tools and Materials for the Frida Engage Blog Series☆45Updated 7 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 8 years ago
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆17Updated 9 years ago
- OllyCallTrace is a plugin for OllyDbg to trace the call chain of a thread.☆54Updated 14 years ago
- A smali emulator.☆25Updated 7 years ago
- A Fork of Auditd geared specifically for running on the Android platform. Includes system applications, AOSP patches, and kernel patches …☆47Updated 12 years ago
- User-mode part of Zerokit platform☆22Updated 6 years ago
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- Zerokit shared code☆17Updated 6 years ago
- Android privilege escalation via an use-after-free in binder.c☆39Updated 5 years ago
- 🕵️ The crappy, magical string Java/Android decrypter☆11Updated 6 years ago
- Analysis and Modification Tool for Executables☆17Updated 6 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Updated 7 years ago
- Bare Knuckled AV Breaking☆58Updated 7 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Updated 14 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆24Updated 7 years ago
- Application Security library☆11Updated 13 years ago
- Yet another tool for dump mapped memory regions of process, designed to work with Android☆19Updated 8 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 8 years ago