Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack surface analysis.
☆68Jul 12, 2020Updated 5 years ago
Alternatives and similar repositories for Winstrument
Users that are interested in Winstrument are comparing it to the libraries listed below
Sorting:
- ☆12Jun 20, 2022Updated 3 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- collection of helper tools for fuzzing☆17Oct 3, 2023Updated 2 years ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- ☆12Jun 14, 2017Updated 8 years ago
- ☆23May 28, 2021Updated 4 years ago
- Tzer: TVM Implementation of "Coverage-Guided Tensor Compiler Fuzzing with Joint IR-Pass Mutation (OOPSLA'22)“.☆12Jan 15, 2022Updated 4 years ago
- Supporting PoCs and scripts for my talk "OverLAPS: Overriding LAPS Logic"☆22Oct 12, 2025Updated 4 months ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- OSS-Fuzz Public Corpora Crawler☆30Feb 23, 2023Updated 3 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Mar 11, 2021Updated 4 years ago
- QEMU to drcov trace file☆11Nov 21, 2020Updated 5 years ago
- haze binary fuzzer☆56May 19, 2024Updated last year
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Jun 25, 2024Updated last year
- ☆201Mar 9, 2023Updated 2 years ago
- ☆15Sep 14, 2022Updated 3 years ago
- Web user interface and service agent for the monitoring and remote management of WinAFL.☆63Feb 24, 2026Updated last week
- ☆18Aug 7, 2020Updated 5 years ago
- A new type of js fuzzer☆26Feb 10, 2020Updated 6 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Jul 7, 2020Updated 5 years ago
- tool for multi-execution jump coverage introspection☆68Jan 28, 2025Updated last year
- A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU☆70Mar 19, 2020Updated 5 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆219Mar 5, 2020Updated 5 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18May 5, 2023Updated 2 years ago
- Superion Mutator for AFLPlusPlus☆31Dec 5, 2023Updated 2 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- CFG and scripts for fuzzing the PHP interpreter with Domato☆28Jan 4, 2020Updated 6 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- A coverage-guided and memory-detection enabled fuzzer for windows applications.☆32Feb 1, 2021Updated 5 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- ☆53Oct 20, 2020Updated 5 years ago
- AFL training workshop materials☆20Aug 11, 2018Updated 7 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Nov 14, 2020Updated 5 years ago