danigargu / ida-scripts
Misc IDA Pro scripts
☆23Updated 8 years ago
Alternatives and similar repositories for ida-scripts:
Users that are interested in ida-scripts are comparing it to the libraries listed below
- Using SEH to bypass CFG☆29Updated 8 years ago
- ☆13Updated 7 years ago
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago
- ☆28Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Updated 6 years ago
- black hat Asia 2017 Slides☆22Updated 8 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Updated 6 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Updated 6 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Updated 7 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Updated 9 years ago
- ☆22Updated 7 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- ☆16Updated 4 years ago
- DbgFlashVul☆12Updated 9 years ago
- BlazeFox Exploit☆18Updated 6 years ago
- Shellcode tracer☆15Updated 8 years ago
- My conference presentations and publications☆26Updated 3 years ago
- Green shellcode challenge tools☆22Updated 6 years ago
- Dalvik Header Plugin for IDA Pro☆22Updated 12 years ago
- API logger plugin for Intel Pintool☆14Updated 7 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- ☆12Updated 7 years ago
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 7 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 8 years ago
- Version of Binnavi used for the thesis "Finding the needle in the heap : combining binary analysis techniques to trigger use-after-free"☆10Updated 7 years ago