lukdog / backtolife
Memory forensic tool for process resurrection starting from a memory dump
☆20Updated 7 years ago
Alternatives and similar repositories for backtolife:
Users that are interested in backtolife are comparing it to the libraries listed below
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Updated 7 years ago
- Win32 Shellcodes☆9Updated 7 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 6 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 8 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 6 years ago
- ☆12Updated 7 years ago
- Shellcode tracer☆15Updated 8 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 9 years ago
- ☆28Updated 7 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 10 years ago
- ☆20Updated 6 years ago
- ☆26Updated 8 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- Malware analyses and helpful scripts☆29Updated 2 years ago
- Slides & Video Demos of My Talk Titled Browser Exploits? Grab ’em by the Collar! @ Brucon0x09Updated 7 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Updated 9 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- black hat Asia 2017 Slides☆22Updated 7 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Updated 8 years ago
- Version of Binnavi used for the thesis "Finding the needle in the heap : combining binary analysis techniques to trigger use-after-free"☆10Updated 6 years ago
- ☆22Updated 6 years ago
- Binary Analysis Platform☆73Updated 11 years ago
- A Modern Approach☆10Updated 9 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 9 years ago
- Format string exploit generation☆10Updated 9 years ago
- Exploit kit analyzer☆21Updated 9 years ago