dapollak / ctfLinks
☆10Updated 8 years ago
Alternatives and similar repositories for ctf
Users that are interested in ctf are comparing it to the libraries listed below
Sorting:
- A couple of little tools I've made for working with Windows Drivers☆15Updated 9 years ago
- ☆13Updated 10 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Updated 10 years ago
- ☆10Updated 11 years ago
- ☆11Updated 10 years ago
- Malware monitor template based on MinHook☆16Updated 10 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆41Updated 12 years ago
- Plugin for x64dbg to break on unresolved APIs.☆12Updated 7 years ago
- Collection of my IDAPython scripts☆33Updated 9 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 6 years ago
- A library that allows hook any imported function from the IAT (works only in x64)☆11Updated 6 years ago
- Demos presented on Hackerfest 2015☆14Updated 9 years ago
- WIP - Play with Intel VM Extensions☆21Updated 8 years ago
- Automatically exported from code.google.com/p/windbgshark☆12Updated 9 years ago
- Windows build files for the VMHunt Intel PIN Trace tool☆19Updated 6 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Updated 10 years ago
- Native Development Kit for Vista 64bit And Later, by me, Based on NDK Headers 1.0, by Alex Ionescu☆17Updated 9 years ago
- Lists work items being queued currently.☆14Updated 10 years ago
- ☆14Updated 8 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆23Updated 12 years ago
- reversed emet tool☆24Updated 12 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆15Updated 10 years ago
- ☆28Updated 8 years ago
- deprecated☆26Updated 6 years ago
- A simple tool to help you capture Ioctls.☆19Updated 7 years ago
- ☆13Updated 8 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32Updated 10 years ago
- ☆14Updated 8 years ago
- Kernel-mode file scanner☆18Updated 7 years ago