API Tracker by Cysinfo Team
☆22Oct 12, 2016Updated 9 years ago
Alternatives and similar repositories for API-Tracker
Users that are interested in API-Tracker are comparing it to the libraries listed below
Sorting:
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Mar 2, 2017Updated 9 years ago
- My presentations from different conferences☆15Sep 12, 2018Updated 7 years ago
- Linux Runtime Process Injection Tool☆61Feb 21, 2013Updated 13 years ago
- Native Android software for dumping memory from Android processes☆14Sep 18, 2014Updated 11 years ago
- My curated list of best Stackoverflow questions that I have come across. Contributions are welcome!!☆13Jan 24, 2021Updated 5 years ago
- ☆14Jul 28, 2018Updated 7 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Aug 1, 2020Updated 5 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- PyMal is a python based interactive Malware Analysis Framework. It is built on the top of three pure python programes Pefile, Pydbg and V…☆44Jul 10, 2016Updated 9 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- ☆13Nov 1, 2017Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- ☆12Jun 14, 2017Updated 8 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆48Jan 1, 2017Updated 9 years ago
- JEB Scripts☆21Nov 28, 2014Updated 11 years ago
- Kernel (Ring0) - SSDT unhook driver☆14Feb 22, 2018Updated 8 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆61May 11, 2015Updated 10 years ago
- Pwn2Win CTF 2018 NIZK (Non-Interactive Zero-Knowledge) Platform☆30Dec 2, 2018Updated 7 years ago
- ExeScan is the FREE console based tool to detect anomalies in PE (Portable Executable) files. It quickly scans given executable file and …☆21Dec 14, 2018Updated 7 years ago
- Perform WiFi scans from python in OSX. Simply import this module and run wifi_scan()☆18Feb 27, 2016Updated 10 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Jan 8, 2017Updated 9 years ago
- It is a tool to analyze the pattern of memory mapped file I/O using Intel pin.☆19Apr 2, 2018Updated 7 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Feb 24, 2017Updated 9 years ago
- ☆13Aug 28, 2018Updated 7 years ago
- A c++, QT gui based memory engine☆13Mar 6, 2018Updated 8 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Dec 5, 2014Updated 11 years ago
- Samples about Microsoft RPC and native API calls in Windows C☆63Jul 31, 2016Updated 9 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆43Feb 6, 2019Updated 7 years ago
- ☆11Sep 14, 2014Updated 11 years ago
- Ansible Playbook for setting up Datasploit☆14Aug 26, 2016Updated 9 years ago
- Sensors for the datacenter to protect against intruders and high temperatures☆18Sep 13, 2016Updated 9 years ago
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆17Jan 7, 2017Updated 9 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Apr 15, 2019Updated 6 years ago
- my write-ups for flareon7☆27Nov 9, 2020Updated 5 years ago
- socat version 2☆10Aug 30, 2012Updated 13 years ago
- Low Pin Count (LPC) Analyzer for Saleae Logic☆17Apr 18, 2024Updated last year
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago