newlog / exploitingLinks
Stuff you might use when exploiting software
☆80Updated 9 years ago
Alternatives and similar repositories for exploiting
Users that are interested in exploiting are comparing it to the libraries listed below
Sorting:
- Useful Scripts for helping in reverse engeenering☆180Updated 4 years ago
- Security Research and Development Framework☆106Updated 9 years ago
- Blackhat 2012 Sample Codes☆93Updated 9 years ago
- Exploiting MS15-061 local Privilege escalation☆49Updated 9 years ago
- Ruxcon2016 POC Code☆140Updated 8 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 7 years ago
- Windows Software Exploitation☆130Updated 8 years ago
- Another dll injection tool.☆29Updated 10 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Updated 8 years ago
- Frida.re based RunPE (and MapViewOfSection) extraction tool☆112Updated 8 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆85Updated 3 years ago
- Generic scripts for public consumption☆85Updated 6 years ago
- Automated malware unpacker☆120Updated 9 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Updated 4 years ago
- Passive UAC elevation using dll infection☆74Updated 10 years ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Updated 8 years ago
- Reflective Polymorphism☆105Updated 7 years ago
- ☆35Updated 7 years ago
- Tool to view and create Microsoft shim database files (SDB).☆115Updated 8 years ago
- my results for the exercises in the book "Practical Reverse Engineering" by Bruce Dang et al.☆111Updated 11 years ago
- Better version of RunDll with GUI. This program allows you to load DLLs on Windows. You can select how to load the DLL. By direct Entry P…☆235Updated 10 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆239Updated 8 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆76Updated 10 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆184Updated 6 years ago
- Automatically rebuild Import Address Table for dumped PE file. With python bindings!☆120Updated 6 years ago
- Holds all simple Visual Studio programs that I've created over the years.☆115Updated 3 years ago
- A tool to detect and crash Cuckoo Sandbox☆295Updated last year
- Cminer is a tool for enumerating the code caves in PE files.☆152Updated 2 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Updated 12 years ago