deeso / java8-memory-analysisLinks
☆9Updated 8 years ago
Alternatives and similar repositories for java8-memory-analysis
Users that are interested in java8-memory-analysis are comparing it to the libraries listed below
Sorting:
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 7 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- Random stuff for FlareOn☆13Updated 6 years ago
- Scripts targeting specific families☆13Updated 8 years ago
- My conference presentations and publications☆26Updated 3 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Updated 4 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Updated 6 years ago
- reverse engineering, visual binary analysis☆24Updated 8 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago
- Version of Binnavi used for the thesis "Finding the needle in the heap : combining binary analysis techniques to trigger use-after-free"☆10Updated 7 years ago
- Using SEH to bypass CFG☆29Updated 8 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Updated 8 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- ☆12Updated 7 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆15Updated 7 years ago
- Green shellcode challenge tools☆22Updated 6 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 5 years ago
- Misc IDA Pro scripts☆24Updated 8 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆10Updated 7 years ago
- POC for cve-2019-1458☆21Updated 5 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆38Updated 10 years ago
- python library for dumping a linux process from memory☆34Updated 15 years ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- SDBbot Unpacker Python 2.7☆9Updated 5 years ago