newlog / exploitingLinks
Stuff you might use when exploiting software
☆81Updated 10 years ago
Alternatives and similar repositories for exploiting
Users that are interested in exploiting are comparing it to the libraries listed below
Sorting:
- Useful Scripts for helping in reverse engeenering☆182Updated 5 years ago
- Blackhat 2012 Sample Codes☆93Updated 9 years ago
- Security Research and Development Framework☆106Updated 10 years ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Updated 9 years ago
- Windows Software Exploitation☆133Updated 8 years ago
- Holds all simple Visual Studio programs that I've created over the years.☆114Updated 4 years ago
- Automatically rebuild Import Address Table for dumped PE file. With python bindings!☆121Updated 6 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 8 years ago
- Exploiting MS15-061 local Privilege escalation☆49Updated 10 years ago
- Fork of mona.py with x64dbg support☆108Updated 3 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆86Updated 3 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 7 years ago
- Reflective Polymorphism☆108Updated 7 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- Frida.re based RunPE (and MapViewOfSection) extraction tool☆114Updated 8 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Updated 4 years ago
- Sample use cases of the .NET native code hooking technique☆216Updated 7 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆184Updated 6 years ago
- kernel exploitation helper class☆77Updated 9 years ago
- Ruxcon2016 POC Code☆141Updated 9 years ago
- C++-based shellcode builder☆115Updated 5 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Updated 13 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆92Updated 6 years ago
- my results for the exercises in the book "Practical Reverse Engineering" by Bruce Dang et al.☆112Updated 11 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆146Updated 8 years ago
- Passive UAC elevation using dll infection☆75Updated 11 years ago
- Better version of RunDll with GUI. This program allows you to load DLLs on Windows. You can select how to load the DLL. By direct Entry P…☆238Updated 10 years ago
- Content from presentation at BHUSA 2017☆180Updated 8 years ago
- Automated malware unpacker☆121Updated 9 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆406Updated 11 years ago