danigargu / ida-scriptsLinks
Misc IDA Pro scripts
☆23Updated 9 years ago
Alternatives and similar repositories for ida-scripts
Users that are interested in ida-scripts are comparing it to the libraries listed below
Sorting:
- x86_64 linux rootkit using debug registers☆53Updated 3 years ago
- plugin of ida with pin☆48Updated 4 years ago
- My manual analysis of malware families☆13Updated 8 years ago
- Miscellanous scripts used for malware analysis☆23Updated 7 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 6 years ago
- Dalvik Header Plugin for IDA Pro☆23Updated 12 years ago
- Using SEH to bypass CFG☆30Updated 8 years ago
- The official repository of the Hex-Rays IDA Pro vulnerability scanner plugin.☆20Updated 12 years ago
- BlazeFox Exploit☆18Updated 7 years ago
- The Demo for CVE-2018-1000006☆40Updated 7 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Updated 7 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆55Updated 9 years ago
- black hat Asia 2017 Slides☆22Updated 8 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- ☆43Updated 7 years ago
- IDA PDB Loader☆48Updated 7 years ago
- IDA Pro Scripts☆37Updated 10 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Updated 12 years ago
- Analysis PE file or Shellcode☆50Updated 9 years ago
- static malware analysis and report tool open source version for linux☆17Updated 8 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Updated 6 years ago
- My conference presentations and publications☆26Updated 3 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Updated 8 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 6 years ago
- ☆12Updated 8 years ago
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Updated 8 years ago
- A curated list of awesome malware analysis tools and resources☆44Updated 5 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆43Updated 10 years ago
- AxMan ActiveX Fuzzer: This is ancient, please don't use it =D☆28Updated 4 years ago