newlog / exploitingLinks
Stuff you might use when exploiting software
☆80Updated 9 years ago
Alternatives and similar repositories for exploiting
Users that are interested in exploiting are comparing it to the libraries listed below
Sorting:
- Useful Scripts for helping in reverse engeenering☆180Updated 4 years ago
- Windows Software Exploitation☆130Updated 8 years ago
- Blackhat 2012 Sample Codes☆93Updated 9 years ago
- Security Research and Development Framework☆106Updated 9 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆85Updated 3 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Updated 8 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Updated 12 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 7 years ago
- Generic scripts for public consumption☆85Updated 5 years ago
- Fork of mona.py with x64dbg support☆104Updated 3 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆129Updated 8 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆145Updated 7 years ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Updated 8 years ago
- Automatically rebuild Import Address Table for dumped PE file. With python bindings!☆120Updated 6 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- Exploiting MS15-061 local Privilege escalation☆49Updated 9 years ago
- Frida.re based RunPE (and MapViewOfSection) extraction tool☆112Updated 8 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆184Updated 6 years ago
- ☆141Updated 8 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- fragments of dirty, and quick code. possible error checking or none.☆24Updated 8 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆75Updated 10 years ago
- Windows XP 32-Bit Bootkit☆145Updated 10 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆81Updated 8 years ago
- Personal repository for all ctf related stuffs☆67Updated 8 months ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- Ruxcon2016 POC Code☆140Updated 8 years ago
- ☆52Updated 8 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆60Updated 9 years ago