mandiant / IDA_Pro_VoiceAttack_profile
☆26Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for IDA_Pro_VoiceAttack_profile
- ☆24Updated 5 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 5 years ago
- Rekall Memory Forensic Framework☆29Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆23Updated 3 years ago
- ☆21Updated 3 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆21Updated 7 years ago
- ☆13Updated 7 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 6 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆36Updated 7 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 3 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆16Updated 8 years ago
- ☆32Updated 4 months ago
- pure Python binary analysis framework☆22Updated 6 years ago
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 6 years ago
- Zero Wine Tryouts: An open source malware analysis tool☆16Updated 8 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 6 years ago
- 🔴 A simple kernel-level rootkit☆19Updated 8 years ago
- Static analysis tools for x86 assembly☆13Updated 7 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆31Updated 4 years ago
- A wrapper for capstone for bearparser☆13Updated last year
- ☆33Updated 7 years ago
- Reverse engineering toolkit for exploit/malware analysis☆34Updated 4 years ago
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago
- Python based angr plug in for IDA Pro.☆34Updated 6 years ago
- An opensource API hooking framework☆21Updated 4 years ago
- ☆18Updated 5 years ago
- A collection of anti disassembly techniques☆18Updated 7 years ago
- Miscellaneous old Exploit code and PoCs☆15Updated last month