pykd script to dynamically find vtables on heap (windows x86/x64)
☆25Oct 14, 2014Updated 11 years ago
Alternatives and similar repositories for vtfinder
Users that are interested in vtfinder are comparing it to the libraries listed below
Sorting:
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- ☆10Aug 8, 2015Updated 10 years ago
- Tool for automation of GUI-based testing.☆16Jan 7, 2015Updated 11 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Jul 25, 2014Updated 11 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- officefileinfo is a python script to help analyse the newer Microsoft Office file formats. There are numerous tools for dealing with the …☆16Apr 28, 2016Updated 9 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Jul 1, 2015Updated 10 years ago
- A tool for netpens.☆37Jun 18, 2019Updated 6 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- Redress Dissassembler is a cross platform binary disassembler written in Java with Capstone bindings☆24Mar 22, 2016Updated 9 years ago
- Burp Scanner XML Parser☆36Sep 24, 2014Updated 11 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- This firewall allows only communications made from allowed processes.☆13Aug 10, 2016Updated 9 years ago
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- Occupy WiFi Firmware☆11Sep 14, 2015Updated 10 years ago
- Scans a system for potential credit cards for PCI DSS compliance☆16Oct 30, 2016Updated 9 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- A fuzzing script for MitmProxy☆24May 15, 2015Updated 10 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Nov 4, 2014Updated 11 years ago
- Allows installing or booting Operating Systems via PXE over the Network. We hopefully can implement RBCP (Intels Remote Boot Configuratio…☆15Jul 23, 2025Updated 7 months ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Aug 31, 2020Updated 5 years ago
- ☆12Feb 4, 2019Updated 7 years ago
- A scriptable debugger library to interact with Android applications☆46Sep 27, 2013Updated 12 years ago
- Collection of scanner checks missing in Burp☆15Apr 22, 2022Updated 3 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Burp plugin to turn requests into curl commands☆16Apr 25, 2014Updated 11 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago