imperva / frida-jit-unpacker
The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.
☆57Updated last year
Alternatives and similar repositories for frida-jit-unpacker:
Users that are interested in frida-jit-unpacker are comparing it to the libraries listed below
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆42Updated 10 months ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆55Updated 8 months ago
- Proof-of-Concept for CVE-2024-26218☆51Updated last year
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆50Updated last year
- Analysis of the vulnerability☆51Updated last year
- ☆42Updated last month
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆24Updated 9 months ago
- IDA Python scripts☆35Updated 2 weeks ago
- ☆36Updated 4 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 2 months ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- Linux Sleep Obfuscation☆95Updated last year
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆33Updated last year
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆116Updated 9 months ago
- ☆36Updated 4 months ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆73Updated 3 months ago
- ☆59Updated last year
- ☆25Updated 5 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆36Updated 2 months ago
- LPE exploit for CVE-2023-36802☆22Updated last year
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year
- A more reliable way of resolving syscall numbers in Windows☆49Updated last year
- Folder Or File Delete to Get System Shell on Current Session Desktop☆39Updated 3 months ago
- A dynamic unpacking tool☆134Updated last year
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆51Updated this week
- ☆29Updated last year
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆44Updated 6 months ago