k33nteam / cc-shellcoding
☆92Updated 9 years ago
Related projects: ⓘ
- A static Internet Explorer Fuzzer.☆50Updated 7 years ago
- Some source code snippets In my development.☆27Updated 2 years ago
- Slides, codes and videos of the talk "DEP/ASLR bypass without ROP/JIT" on CanSecWest 2013☆50Updated 11 years ago
- A Browser Fuzzer for Vulnerbilities☆65Updated 9 years ago
- HitCon 2015 spartan 0day & exploit☆26Updated 9 years ago
- Windows Kernel Dump Analyzer☆15Updated 9 years ago
- ☆85Updated this week
- Adobe Flash Player File Instrumentation Tool For Security Research☆86Updated 2 years ago
- ☆19Updated 10 years ago
- ☆27Updated this week
- plugin of ida with pin☆48Updated 3 years ago
- ☆28Updated this week
- ☆51Updated 7 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆53Updated 8 years ago
- ☆16Updated this week
- Imports MSDN documentation into IDA Pro☆51Updated 12 years ago
- Collection of tools for the Pin dynamic instrumentation framework☆42Updated 4 years ago
- Internet Explorer MemoryProtection Mitigation☆32Updated 10 years ago
- Some example source code for fixed IE11 sandbox escapes.☆139Updated 10 years ago
- ☆69Updated this week
- fuzz☆125Updated 9 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 11 years ago
- ☆28Updated this week
- Use CVE-2016-3308 corrupt win32k desktop heap☆50Updated 8 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆59Updated 8 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆96Updated 11 years ago
- An implementation of a generic unpacker based on Intel PIN☆29Updated 8 years ago
- ☆33Updated 9 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 7 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 5 years ago