enkomio / sacaraLinks
Sacara VM
☆122Updated 5 years ago
Alternatives and similar repositories for sacara
Users that are interested in sacara are comparing it to the libraries listed below
Sorting:
- .NET instrumentation framework☆72Updated 7 years ago
- A binary analysis framework☆134Updated 4 years ago
- A simple utility to list all methods of a given .NET Assembly and to invoke them☆75Updated 4 years ago
- Demos for Presentation on Windows Runtime Security☆70Updated 6 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆85Updated 3 years ago
- Grep-like WinDbg extension☆44Updated 8 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆92Updated 6 years ago
- An obfuscation engine which obfuscates Intel x86 32-bit binary code.☆55Updated 7 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- Security Research and Development Framework☆106Updated 10 years ago
- Diff tool for comparing symbols in PDB files☆84Updated 5 years ago
- Sample use cases of the .NET native code hooking technique☆214Updated 7 years ago
- A project that aims to automatically devirtualize code that has been virtualized using x86virt☆126Updated 2 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Updated 7 years ago
- ☆91Updated 8 years ago
- .NET runtime inspector☆273Updated 6 years ago
- A simple API monitor for Windbg☆64Updated 8 years ago
- Load a Windows Kernel Driver☆94Updated 8 years ago
- kernel exploitation helper class☆77Updated 8 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 7 years ago
- Public repository for HEVD exploits☆20Updated 7 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Updated 8 years ago
- Polymorphic VM and PoliCTF '17 reversing challenge.☆73Updated last year
- Any useful windbg plugins I've written.☆116Updated 7 years ago
- Scripts to prepare Windows system for debugging.☆30Updated 4 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI☆42Updated 8 years ago