deeso / java8-memory-analysis
☆9Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for java8-memory-analysis
- Exploits for YARA 3.7.1 & 3.8.1☆30Updated 5 years ago
- Random stuff for FlareOn☆13Updated 6 years ago
- ☆12Updated 4 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- My conference presentations and publications☆26Updated 2 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 6 years ago
- Version of Binnavi used for the thesis "Finding the needle in the heap : combining binary analysis techniques to trigger use-after-free"☆10Updated 6 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Updated 5 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- A stateful fuzzing engine.☆46Updated 6 years ago
- POC for cve-2019-1458☆21Updated 4 years ago
- ☆22Updated 6 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- ☆20Updated 6 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 4 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Updated 6 years ago
- Large Scale Cumulative Binary Diffing.☆25Updated 6 years ago
- ☆31Updated 6 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- collection of used Tools for CTFs☆15Updated 3 years ago
- A fork of AFL for fuzzing Windows binaries☆20Updated 6 years ago
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago
- ☆13Updated 7 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆53Updated 7 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 6 years ago