Adobe Flash Player File Instrumentation Tool For Security Research
☆86Sep 3, 2022Updated 3 years ago
Alternatives and similar repositories for FlashHacker
Users that are interested in FlashHacker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Patching Flash binary to stop Flash exploits and zero-days☆62Apr 18, 2017Updated 8 years ago
- ☆15Oct 27, 2015Updated 10 years ago
- Private set of tools for game hacking☆12Jan 25, 2015Updated 11 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- Dynamic instrumentation tool for Adobe Flash Player built on Intel Pin☆148Aug 5, 2014Updated 11 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Oct 10, 2014Updated 11 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- ☆21Mar 24, 2015Updated 11 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- ☆11Mar 11, 2015Updated 11 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 9 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- Hex-Rays Decompiler Enhanced View☆185Sep 21, 2018Updated 7 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- ☆29Jun 17, 2020Updated 5 years ago
- Lists work items being queued currently.☆15Jun 7, 2015Updated 10 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Aug 21, 2014Updated 11 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Oct 6, 2016Updated 9 years ago
- Windows kernel vulnerability in win32k.sys Driver☆35Dec 6, 2015Updated 10 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- ☆96Dec 24, 2014Updated 11 years ago
- an efficient yet easy to use network packet builder and parser☆11Jul 3, 2017Updated 8 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Aug 25, 2014Updated 11 years ago
- A c++, QT gui based memory engine☆13Mar 6, 2018Updated 8 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago
- ☆140Jul 17, 2017Updated 8 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago