lukdog / backtolifeView external linksLinks
Memory forensic tool for process resurrection starting from a memory dump
☆20Jun 6, 2017Updated 8 years ago
Alternatives and similar repositories for backtolife
Users that are interested in backtolife are comparing it to the libraries listed below
Sorting:
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- Rootkit Detector for UNIX☆61Aug 11, 2023Updated 2 years ago
- crash poc & Leak info PoC☆18Mar 19, 2018Updated 7 years ago
- 一个对常见的web日志进行解析处理的粗糙DEMO☆21Jun 3, 2018Updated 7 years ago
- hook: linux kernel syscall hijack☆21Dec 28, 2016Updated 9 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43May 1, 2020Updated 5 years ago
- ☆12May 12, 2014Updated 11 years ago
- Publications of my PDF vulnerability research, including presentation materials (slides and whitepapers) and demonstration files (proof-o…☆11Jul 4, 2020Updated 5 years ago
- Tools and library to manipulate EFI variables.☆10Jan 16, 2026Updated 3 weeks ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆79May 10, 2018Updated 7 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Jun 14, 2018Updated 7 years ago
- american fuzzy lop fuzzer from lcamtuf☆14Oct 31, 2014Updated 11 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆14Mar 26, 2015Updated 10 years ago
- Linux backdoor using ICMP payload for activation☆11Nov 18, 2014Updated 11 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 6 years ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 3 months ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- ☆16Sep 7, 2017Updated 8 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Multithreaded SQL union bruteforcer☆16Sep 9, 2011Updated 14 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- POC and exploitation of vulnerabilities☆91Mar 22, 2022Updated 3 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- A repository with simple projects created for testing/learning purpose☆46Dec 18, 2025Updated last month
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Sep 13, 2023Updated 2 years ago
- 浏览器XSS 过滤器Fuzzing 框架 (browser xss aduit fuzzing framework )..☆15Sep 13, 2016Updated 9 years ago
- Slide deck for DefCon Beijing☆39May 15, 2018Updated 7 years ago
- 非法域名挖掘与画像系统。☆36Jul 22, 2017Updated 8 years ago
- Windows build files for the VMHunt Intel PIN Trace tool☆19Nov 26, 2018Updated 7 years ago
- BlazeFox Exploit☆18Oct 13, 2018Updated 7 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago