imperva / frida-jit-unpacker
The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.
☆56Updated 11 months ago
Alternatives and similar repositories for frida-jit-unpacker:
Users that are interested in frida-jit-unpacker are comparing it to the libraries listed below
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆39Updated 9 months ago
- Windows AppLocker Driver (appid.sys) LPE☆52Updated 7 months ago
- ☆25Updated 4 months ago
- Analysis of the vulnerability☆49Updated last year
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆50Updated last year
- Proof-of-Concept for CVE-2024-26218☆49Updated 10 months ago
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆24Updated 8 months ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated last year
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆114Updated 8 months ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated last year
- Quick test for CVE-2023-26025 behaviours☆12Updated last year
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 2 years ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆86Updated last year
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆49Updated last month
- ☆37Updated last year
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- A more reliable way of resolving syscall numbers in Windows☆48Updated last year
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆84Updated 11 months ago
- Report and exploit of CVE-2023-36427☆91Updated last year
- IDA Python deobfuscation script for ConfuserEx binaries☆35Updated 2 years ago
- IDA Python scripts☆30Updated last year
- Golang bindings for PE-sieve☆42Updated last year
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆44Updated 5 months ago
- A few examples of how to trap virtual memory access on Windows.☆28Updated 3 months ago
- ☆25Updated 3 months ago
- A journal for $6,000 Riot Vanguard bounty.☆62Updated last year
- Progress of learning kernel development☆14Updated 2 years ago