微软7月布丁增加内存延迟释放机制
☆11Jul 19, 2014Updated 11 years ago
Alternatives and similar repositories for MemoryProtection
Users that are interested in MemoryProtection are comparing it to the libraries listed below
Sorting:
- ☆21Mar 24, 2015Updated 10 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- PE rebuilder, based on yoda's realigndll☆12Oct 1, 2011Updated 14 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- Adobe Flash Player File Instrumentation Tool For Security Research☆86Sep 3, 2022Updated 3 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- Extract LZMA sections from cable modem firmware images☆20Nov 18, 2013Updated 12 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Aug 25, 2014Updated 11 years ago
- A utility/cheat for Mu Online classic☆11Mar 11, 2018Updated 8 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- parses quicktime metadata☆12Oct 5, 2012Updated 13 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- HitCon 2015 spartan 0day & exploit☆27Sep 1, 2015Updated 10 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Windows 8.1 + IE 11 Exploit☆18Jul 26, 2016Updated 9 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- random RE stuff☆21May 11, 2012Updated 13 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Aug 31, 2020Updated 5 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- windows api hooking (user mode) sample☆21Jul 24, 2014Updated 11 years ago
- ☆26Jan 18, 2026Updated 2 months ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Jan 29, 2015Updated 11 years ago
- This script is made to detect (D)DoS attacks on VPS. Some Hosting Providers won't notify you if your VPS is under attack. So I made to th…☆10Mar 6, 2024Updated 2 years ago
- ☆15Oct 27, 2015Updated 10 years ago
- Debugger extension for the Debugging Tools for Windows (WinDbg, KD, CDB, NTSD).☆69Nov 14, 2016Updated 9 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- Decompiler for Code Virtualizer 1.3.8 (Oreans)☆88Oct 3, 2012Updated 13 years ago
- Java hex viewer component☆20Mar 4, 2011Updated 15 years ago
- ☆12Sep 2, 2017Updated 8 years ago