mbrengel / memscrimperView external linksLinks
Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"
☆26Jul 22, 2019Updated 6 years ago
Alternatives and similar repositories for memscrimper
Users that are interested in memscrimper are comparing it to the libraries listed below
Sorting:
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- ☆13Nov 1, 2017Updated 8 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago
- A Pythonic wrapper to MassDNS☆24Mar 21, 2018Updated 7 years ago
- Provides a way which you can load a .NET dll/exe from disk, modify/inject IL, and then run the assembly all in memory without modifying t…☆29Mar 31, 2017Updated 8 years ago
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆10Dec 4, 2018Updated 7 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Oct 26, 2025Updated 3 months ago
- Demonstrate the new FileDispositionInfoEx behavior☆15Nov 6, 2017Updated 8 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- A Windows native DLL injection library written in C# that supports several methods of injection.☆13Dec 17, 2018Updated 7 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆13Oct 10, 2018Updated 7 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- a tool for downloading the BugTraq Ids database☆13May 22, 2023Updated 2 years ago
- deprecated☆19Jan 15, 2019Updated 7 years ago
- penter hook example and driver time recorder☆31Oct 2, 2017Updated 8 years ago
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆38May 11, 2020Updated 5 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 7 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- A collection of PeachPits for Peach Fuzzer to support EAP, 802.1x, and RADIUS Fuzzing☆17Dec 29, 2015Updated 10 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Jul 2, 2018Updated 7 years ago
- A Windows Event Processing Utility☆47Feb 21, 2018Updated 7 years ago
- Yet Another Sig Scanner☆34Jul 18, 2018Updated 7 years ago
- ☆30May 23, 2017Updated 8 years ago
- A loadable dll that tracks memory changes, IAT hooks, and dynamically emplaced "JMP" in the x86 host executable.☆12Oct 22, 2023Updated 2 years ago
- A Cheat I Made Using C# In My Free Time Trying To Improve Myself. Enjoy!☆12Nov 5, 2020Updated 5 years ago
- Creating a vulnerable environment and the PoC☆15Nov 25, 2019Updated 6 years ago
- Semantic Crash Bucketing☆16Sep 8, 2020Updated 5 years ago
- Terminal Forensics CheatSheets☆13Jul 28, 2015Updated 10 years ago
- Indexed search and clustering tool for digital forensics☆26Nov 5, 2014Updated 11 years ago
- ☆16Sep 7, 2017Updated 8 years ago
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Nov 18, 2016Updated 9 years ago
- ActiveMime File Format Documentation☆18Jun 28, 2021Updated 4 years ago
- Kernel-mode file scanner☆19Jul 16, 2018Updated 7 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- The exploit for Panda AV LPE☆37May 22, 2019Updated 6 years ago