Haxathon Supremacy Virtual Machine
☆33May 22, 2017Updated 8 years ago
Alternatives and similar repositories for hsvm
Users that are interested in hsvm are comparing it to the libraries listed below
Sorting:
- ☆22May 25, 2017Updated 8 years ago
- WIP - Play with Intel VM Extensions☆23Jun 12, 2017Updated 8 years ago
- hypervisor in windows device driver by intel vt☆14Aug 25, 2018Updated 7 years ago
- ☆11Sep 28, 2017Updated 8 years ago
- Minifilter Driver☆15Feb 10, 2017Updated 9 years ago
- [Not work] Deobfuscate obfuscated binaries!☆11Dec 16, 2016Updated 9 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Mar 21, 2023Updated 2 years ago
- Static analysis tools for x86 assembly☆13Mar 3, 2017Updated 9 years ago
- a binary x86win32 code obfuscator using virtual machine☆31Jan 8, 2017Updated 9 years ago
- ☆15Mar 8, 2017Updated 8 years ago
- Automated IOC-Generation scripts and tools☆24Sep 14, 2016Updated 9 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Collection of tools for the Pin dynamic instrumentation framework☆42Jan 21, 2020Updated 6 years ago
- Malware sandbox evasion tricks and solution☆32Jul 5, 2017Updated 8 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Mar 9, 2016Updated 9 years ago
- Simple python wrapper for the Robtex API (see https://www.robtex.com/api/).☆13Apr 17, 2021Updated 4 years ago
- ☆14May 8, 2017Updated 8 years ago
- An attempt to reverse-engineer the protocol for Diablo III, allowing a MITM attack on the game by intercepting packets as they pass throu…☆13Jun 21, 2012Updated 13 years ago
- Imports MSDN documentation into IDA Pro☆52Jan 10, 2012Updated 14 years ago
- An ark tool's driver☆40May 11, 2017Updated 8 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- Decrement Windows Kernel for fun and profit☆39Jan 29, 2018Updated 8 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- Meld virtual machine.☆28Nov 20, 2015Updated 10 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- ☆18Aug 31, 2014Updated 11 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- A simple tool to help you capture Ioctls.☆20Aug 26, 2017Updated 8 years ago
- Virtual Machine Introspection (VMI) project☆15Apr 22, 2015Updated 10 years ago
- Parses MSDN documentation into an XML file☆31Jan 10, 2012Updated 14 years ago
- Dynamic tracing for binary applications (using PIN), IDA plugin to visualize and interact with the traces☆96Mar 24, 2012Updated 13 years ago
- A library for intercepting native functions by hooking KiFastSystemCall☆74Apr 6, 2020Updated 5 years ago
- OllySocketTrace is a plugin for OllyDbg to trace the socket operations being performed by a process.☆63Nov 4, 2011Updated 14 years ago
- TLB Splitting with intel vt-d and KVM☆21Oct 18, 2017Updated 8 years ago
- LCXL影子系统☆47Aug 16, 2024Updated last year
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago