☆16Dec 14, 2017Updated 8 years ago
Alternatives and similar repositories for activationcontext
Users that are interested in activationcontext are comparing it to the libraries listed below
Sorting:
- ☆34Sep 22, 2017Updated 8 years ago
- ☆18Sep 4, 2017Updated 8 years ago
- ☆36Sep 5, 2017Updated 8 years ago
- ACTIVELabs Security Advisories☆24May 19, 2021Updated 4 years ago
- ast pattern matching with automated structure recovery for hex-rays decompiler☆27Feb 16, 2026Updated last week
- Custom instruction length for hex-rays☆28Jan 17, 2026Updated last month
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- My articles for Paged Out! #2☆17Nov 20, 2019Updated 6 years ago
- User-mode part of Zerokit platform☆22Mar 30, 2019Updated 6 years ago
- Windows NT port of 'Main is usually a function. So then when is it not?'☆27Mar 11, 2024Updated last year
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Aug 17, 2019Updated 6 years ago
- LD_PRELOAD magic for Android's AssetManager☆82Jun 6, 2022Updated 3 years ago
- ☆20Apr 5, 2018Updated 7 years ago
- metasploit loader with antivirus bypass module☆18Jun 26, 2016Updated 9 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆25Oct 25, 2020Updated 5 years ago
- Perform packet-process correlation on Windows using the Windows equivalent of the Linux sensor.☆25Sep 23, 2015Updated 10 years ago
- Slides of 44Con 2018☆22Oct 11, 2018Updated 7 years ago
- Full reversing of the Microsoft Auxiliary Windows API Library and ported to C☆24Dec 17, 2024Updated last year
- Automatically identify and extract potential anti-debugging techniques used by malware.☆27Nov 20, 2024Updated last year
- Basics of Reverse Engineering Winter 2022☆28Mar 11, 2022Updated 3 years ago
- API Set Viewer☆91Jan 20, 2025Updated last year
- exploit development☆49Mar 14, 2018Updated 7 years ago
- Length disassembler for x86 and x86_64 in Rust.☆24Sep 7, 2019Updated 6 years ago
- use afl to fuzz swift program☆24Nov 3, 2017Updated 8 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆56Dec 23, 2017Updated 8 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 6 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Binary Ninja plugin to deobfuscate strings obfuscated with the Garble project☆44Mar 6, 2025Updated 11 months ago
- VBA analysis tools☆25Aug 15, 2025Updated 6 months ago
- A POC for Windows Extension Host hooking☆24Jul 13, 2019Updated 6 years ago
- Automation of the javascript deobfuscation process☆25Feb 2, 2026Updated 3 weeks ago
- ☆30Dec 4, 2018Updated 7 years ago
- VrtuleTree is a tool that displays information about driver and device objects present in the system and relations between them. Its func…☆60Feb 28, 2021Updated 5 years ago
- Redirect spawned iOS application stdout and stderr to pty☆29Jan 29, 2025Updated last year
- POC viruses I have created to demo some ideas☆59Apr 12, 2020Updated 5 years ago
- Symbol REPL☆31Mar 4, 2018Updated 7 years ago
- Basic SDK for Intezer Analyze API 2.0☆31Feb 22, 2026Updated last week
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Dec 28, 2016Updated 9 years ago