enkomio / sacara
Sacara VM
☆122Updated 5 years ago
Alternatives and similar repositories for sacara:
Users that are interested in sacara are comparing it to the libraries listed below
- A binary analysis framework☆132Updated 4 years ago
- A simple utility to list all methods of a given .NET Assembly and to invoke them☆73Updated 3 years ago
- .NET instrumentation framework☆72Updated 7 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆84Updated 2 years ago
- .NET runtime inspector☆269Updated 6 years ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Updated 8 years ago
- A project that aims to automatically devirtualize code that has been virtualized using x86virt☆126Updated 2 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆116Updated 6 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆89Updated 5 years ago
- Sample use cases of the .NET native code hooking technique☆209Updated 7 years ago
- ☆213Updated 6 years ago
- Parsers for custom malware formats ("Funky malware formats")☆95Updated 3 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆149Updated 5 years ago
- A tool to exploit .NET DCOM for EoP and RCE. Is fixed in latest versions of the .NET.☆88Updated 10 years ago
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆73Updated 5 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆75Updated 10 years ago
- Diff tool for comparing symbols in PDB files☆84Updated 5 years ago
- Demos for Presentation on Windows Runtime Security☆69Updated 6 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆84Updated 8 years ago
- An attempt to create a friendly version of WinDbg☆102Updated 6 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆120Updated 4 years ago
- Windows API tracer for malware (oldname: unitracer)☆117Updated 7 years ago
- ☆91Updated 8 years ago
- ViDi Visual Disassembler (experimental)☆76Updated 2 years ago
- Grep-like WinDbg extension☆43Updated 7 years ago
- Security Research and Development Framework☆106Updated 9 years ago
- FLARE Kernel Shellcode Loader☆176Updated 5 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- Driver Initial Reconnaissance Tool☆122Updated 5 years ago