michaeljgoodman / Dumpulator-IDA
Currently proof-of-concept
☆16Updated 3 years ago
Alternatives and similar repositories for Dumpulator-IDA:
Users that are interested in Dumpulator-IDA are comparing it to the libraries listed below
- genpatch is IDA plugin that generates a python script for patching binary☆32Updated last year
- Code Integrity Violation Spotter☆16Updated 10 months ago
- ☆12Updated 3 years ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆38Updated 3 years ago
- Yet another Windows DLL injector.☆38Updated 3 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16Updated 2 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- A kernel mode Windows rootkit in development.☆48Updated 3 years ago
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Updated last year
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Updated last year
- ☆16Updated 2 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- FastSymApi - A Fast API PDB Symbol Cache Server that efficiently caches and compresses PDBs on disk for quick and repeated retrieval.☆19Updated 6 months ago
- Triton based symbolic emulator☆16Updated 2 years ago
- An example of how to use Microsoft Windows Warbird technology☆27Updated last year
- vmware-backdoor☆33Updated 3 years ago
- ☆25Updated 5 months ago
- Non organized Cpp code files I used for my research on Windows☆18Updated 4 years ago
- Easily hook WIN32 x64 functions☆18Updated last month
- ☆45Updated 4 years ago
- Subtract one PE file from another!☆21Updated 3 years ago
- POC For CVE-2022-24483☆14Updated 3 years ago
- Here is python script I wrote for deobfuscation APT32 sample.☆10Updated 3 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆19Updated 3 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆22Updated last year
- ☆33Updated 3 years ago
- IDA plugin to deobfuscate emotet CFF☆17Updated 2 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Updated 5 months ago
- Using Thread Description To Hide Shellcodes☆14Updated 2 years ago