Collection of pin tools
☆52Dec 29, 2015Updated 10 years ago
Alternatives and similar repositories for pin
Users that are interested in pin are comparing it to the libraries listed below
Sorting:
- Services and Drivers control application☆19Jul 24, 2017Updated 8 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Jul 25, 2014Updated 11 years ago
- Today Plugin (x64) - A Plugin For x64dbg☆13Jul 17, 2018Updated 7 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆15Sep 19, 2015Updated 10 years ago
- PE rebuilder, based on yoda's realigndll☆12Oct 1, 2011Updated 14 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- Detours from binaries method entry/exit point to Python scripts (PIN, CPython API)☆31Mar 13, 2013Updated 12 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 8 years ago
- Plugins for Scylla☆20Sep 14, 2011Updated 14 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- ☆14Aug 15, 2018Updated 7 years ago
- Securing Data Analytics on Intel SGX using Randomization☆13Aug 30, 2017Updated 8 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22May 31, 2017Updated 8 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- ☆25Apr 8, 2016Updated 9 years ago
- ☆17Mar 3, 2016Updated 9 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Dec 12, 2014Updated 11 years ago
- easy detour-, vftable-, iat- and eathooking☆12Mar 30, 2016Updated 9 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- An aggregate of tools used in the core of vmp_dbg plus other parsing utils to parse vmp bc.☆16Oct 18, 2016Updated 9 years ago
- Any useful windbg plugins I've written.☆117Apr 10, 2018Updated 7 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- Use Intel Pin tools to analysis binary.☆38Jul 19, 2015Updated 10 years ago
- ☆10Jan 7, 2017Updated 9 years ago
- C++ game hack for Counter-Strike: Source. It was coded for the "Orange Box" update.☆15Sep 5, 2014Updated 11 years ago
- ☆21May 10, 2017Updated 8 years ago
- REIL translation library☆36May 6, 2016Updated 9 years ago
- ☆34Sep 22, 2017Updated 8 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51May 3, 2016Updated 9 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- Microsoft Edge MemGC Internals☆17Sep 2, 2015Updated 10 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago