newlog / exploitingLinks
Stuff you might use when exploiting software
☆80Updated 9 years ago
Alternatives and similar repositories for exploiting
Users that are interested in exploiting are comparing it to the libraries listed below
Sorting:
- Useful Scripts for helping in reverse engeenering☆180Updated 5 years ago
- Blackhat 2012 Sample Codes☆93Updated 9 years ago
- Security Research and Development Framework☆106Updated 10 years ago
- Another dll injection tool.☆29Updated 10 years ago
- Automated malware unpacker☆120Updated 9 years ago
- Exploiting MS15-061 local Privilege escalation☆49Updated 10 years ago
- Frida.re based RunPE (and MapViewOfSection) extraction tool☆113Updated 8 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆85Updated 3 years ago
- ☆36Updated 8 years ago
- Windows Software Exploitation☆131Updated 8 years ago
- Fork of mona.py with x64dbg support☆105Updated 3 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 7 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 7 years ago
- Offline debugger for malware's reverse engineering☆116Updated 10 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Updated 12 years ago
- kernel exploitation helper class☆77Updated 8 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆77Updated 10 years ago
- Automatically rebuild Import Address Table for dumped PE file. With python bindings!☆121Updated 6 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆92Updated 6 years ago
- Decodes PlugX traffic and encrypted/compressed artifacts☆38Updated 12 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆146Updated 8 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆240Updated 9 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆85Updated 9 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Updated 4 years ago
- ☆52Updated 9 years ago
- ☆28Updated 11 years ago
- Reflective Polymorphism☆106Updated 7 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Updated 8 years ago
- Python scripts for reverse engineering.☆184Updated 4 years ago