long123king / PE-Replay
This is a pintool that can analyze target dynamically and output code blocks and "key frames".
☆15Updated 9 years ago
Alternatives and similar repositories for PE-Replay:
Users that are interested in PE-Replay are comparing it to the libraries listed below
- Debug Bootkit Tool Source☆9Updated 7 years ago
- ☆12Updated 7 years ago
- ☆10Updated 10 years ago
- ☆11Updated 9 years ago
- ☆7Updated 8 years ago
- IDA WhatAPIs PlugIn☆7Updated 9 years ago
- wow64 syscall filter☆13Updated 10 years ago
- Lists work items being queued currently.☆13Updated 9 years ago
- Project for Injecting into Windows Processes☆13Updated 12 years ago
- Windows device tree walker☆15Updated 6 years ago
- ☆9Updated 6 years ago
- PinVMShield: Dynamic Binary Instrumentation evasion/detection☆10Updated 6 years ago
- Dynamic binary analysis via platform emulation☆12Updated 6 years ago
- This repository is a clne of the new cuckoo monitor where I added some stuff to get the calling address for every hooked API☆8Updated 8 years ago
- ☆15Updated 9 years ago
- windows ntfs legasy file system filterUpdated 9 years ago
- FaultInjection Project☆7Updated 8 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Updated 9 years ago
- ☆9Updated 8 years ago
- IDA2PAT_Reloaded for windows and mac osx☆13Updated 7 years ago
- Malwarebytes Antivirus CVE☆8Updated 6 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 6 years ago
- DbgFlashVul☆12Updated 9 years ago
- Kernel-mode file scanner☆18Updated 6 years ago
- ☆12Updated 7 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Updated 9 years ago
- ShellcodeOS☆10Updated 8 years ago
- ☆13Updated 6 years ago
- Windows registry files interactive viewer☆9Updated 7 years ago
- Cross-referencing network communication for detecting Advanced Persistent Threat (APT) malware☆6Updated 9 years ago