Diffing process heaps
☆15Jul 23, 2022Updated 3 years ago
Alternatives and similar repositories for heapdiff
Users that are interested in heapdiff are comparing it to the libraries listed below
Sorting:
- Hooking vtables☆10Jul 23, 2022Updated 3 years ago
- Run one process as another under Windows☆11Jul 23, 2022Updated 3 years ago
- PE Infector/Cryptor source code☆20Jul 23, 2022Updated 3 years ago
- Runtime DirectX9 Hooking☆16Jul 23, 2022Updated 3 years ago
- A tool to leverage Virus Total's API key with advanced queries to download malware(s) and report(s).☆11Apr 24, 2013Updated 12 years ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Aug 31, 2020Updated 5 years ago
- ☆27Mar 1, 2022Updated 4 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- This is an automatic SQL Injection tool called as FatCat , Use of FatCat for testing your web application and exploit your application m…☆18Oct 22, 2015Updated 10 years ago
- Borrowed Instructions Synthetic Computation☆70Feb 20, 2015Updated 11 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- memdump allows you to dump processes memory at any given time and view its contents. Most programs store critical information in memory t…☆18Aug 17, 2013Updated 12 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- Minimal and hacky PDF lexer☆10Jun 17, 2015Updated 10 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Dec 10, 2015Updated 10 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago
- android kernel disassembler based on MAME emulator code☆39Nov 26, 2013Updated 12 years ago
- A GUI frontend for LLDB.☆27Jul 22, 2021Updated 4 years ago
- MSP430 Microcontroller CPU plugin for Hopper Disassembler☆12May 13, 2017Updated 8 years ago
- bctf2017 challenges☆11Apr 20, 2017Updated 8 years ago
- The official repository of the Hex-Rays IDA Pro vulnerability scanner plugin.☆20Apr 30, 2013Updated 12 years ago
- P3DA - Python3 Exploit Development Assistance for GDB☆40Jul 12, 2015Updated 10 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- writeup of some ctf challs☆11Apr 20, 2025Updated 11 months ago
- elf loader implementation in rust☆14Jul 15, 2018Updated 7 years ago
- Starbound and Casio writeup and exploit for CTCTF 2015☆10Feb 5, 2015Updated 11 years ago
- ☆23Dec 16, 2025Updated 3 months ago
- CC模拟器☆13Mar 21, 2017Updated 8 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Sep 10, 2013Updated 12 years ago
- Headers for private frameworks or undocumented interfaces of iPhoneOS.☆15Mar 23, 2011Updated 14 years ago
- ☆14Jan 5, 2021Updated 5 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆54Jun 19, 2016Updated 9 years ago
- Some helpful things for AVR☆16Jan 23, 2018Updated 8 years ago
- pathscanner☆14Jun 5, 2015Updated 10 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- Encode all hard code string in objective-c project☆15Mar 5, 2019Updated 7 years ago
- BlazeFox Exploit☆18Oct 13, 2018Updated 7 years ago
- Return Oriented Programme Evolution with ROPER☆171Apr 25, 2019Updated 6 years ago