mandiant / IDA_Pro_VoiceAttack_profile
☆26Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for IDA_Pro_VoiceAttack_profile
- Rekall Memory Forensic Framework☆29Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆23Updated 3 years ago
- ☆24Updated 5 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 5 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Updated 4 years ago
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 6 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 7 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆16Updated 8 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 6 years ago
- ☆13Updated 7 years ago
- My conference presentations and publications☆26Updated 2 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 6 years ago
- An opensource API hooking framework☆21Updated 4 years ago
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago
- Ammyy v3 Source Code leak , with ❤️ <3☆36Updated 7 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆31Updated 4 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆21Updated 7 years ago
- ☆32Updated 5 months ago
- Dalvik Header Plugin for IDA Pro☆21Updated 11 years ago
- ☆18Updated 5 years ago
- General purpose repository for miscellaneous scripts, pcaps and malware IOCs that we share with the info-sec research community☆37Updated 4 years ago
- ☆21Updated 3 years ago
- Reverse engineering toolkit for exploit/malware analysis☆34Updated 4 years ago
- A wrapper for capstone for bearparser☆13Updated last year
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 3 years ago
- Code injection via delay load libraries☆34Updated 7 years ago
- ☆36Updated 5 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago