newlog / exploiting
Stuff you might use when exploiting software
☆80Updated 9 years ago
Alternatives and similar repositories for exploiting:
Users that are interested in exploiting are comparing it to the libraries listed below
- Automated malware unpacker☆120Updated 8 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 7 years ago
- Frida.re based RunPE (and MapViewOfSection) extraction tool☆111Updated 7 years ago
- Useful Scripts for helping in reverse engeenering☆180Updated 4 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 5 years ago
- Windows Software Exploitation☆125Updated 7 years ago
- Security Research and Development Framework☆106Updated 9 years ago
- some pocs for antivirus evasion☆129Updated last year
- Ruxcon2016 POC Code☆137Updated 8 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆61Updated 7 years ago
- ☆140Updated 7 years ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Updated 8 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆149Updated 7 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆84Updated 2 years ago
- Exploiting MS15-061 local Privilege escalation☆50Updated 9 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆96Updated 12 years ago
- IDATACO IDA Pro Plugin☆47Updated 8 years ago
- Reflective Polymorphism☆104Updated 6 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 7 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆130Updated 11 years ago
- A Generic Windows Memory Scraping Tool☆70Updated 7 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆88Updated 5 years ago
- Tool to view and create Microsoft shim database files (SDB).☆112Updated 7 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆126Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 10 years ago
- Blackhat 2012 Sample Codes☆93Updated 8 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆69Updated 10 years ago
- ☆49Updated 9 years ago
- Fork of mona.py with x64dbg support☆99Updated 2 years ago
- Simple NTFS crawler.☆56Updated 7 years ago