Adobe Flash Player File Instrumentation Tool For Security Research
☆85Sep 3, 2022Updated 3 years ago
Alternatives and similar repositories for FlashHacker
Users that are interested in FlashHacker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Patching Flash binary to stop Flash exploits and zero-days☆62Apr 18, 2017Updated 9 years ago
- ☆15Oct 27, 2015Updated 10 years ago
- Private set of tools for game hacking☆12Jan 25, 2015Updated 11 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- Dynamic instrumentation tool for Adobe Flash Player built on Intel Pin☆149Aug 5, 2014Updated 11 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- 微软7月布丁增加 内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆37May 4, 2016Updated 10 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Oct 10, 2014Updated 11 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆43Jul 5, 2013Updated 12 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆21Mar 24, 2015Updated 11 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- ☆11Mar 11, 2015Updated 11 years ago
- wow64 syscall filter☆14Nov 12, 2014Updated 11 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 9 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- Hex-Rays Decompiler Enhanced View☆186Sep 21, 2018Updated 7 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆29Jun 17, 2020Updated 5 years ago
- Lists work items being queued currently.☆15Jun 7, 2015Updated 10 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- Some example source code for fixed IE11 sandbox escapes.☆142Aug 21, 2014Updated 11 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Oct 6, 2016Updated 9 years ago
- Windows kernel vulnerability in win32k.sys Driver☆35Dec 6, 2015Updated 10 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- ☆96Dec 24, 2014Updated 11 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- an efficient yet easy to use network packet builder and parser☆11Jul 3, 2017Updated 8 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Aug 25, 2014Updated 11 years ago
- A c++, QT gui based memory engine☆13Mar 6, 2018Updated 8 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- ☆140Jul 17, 2017Updated 8 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago
- CVE-2014-0816☆26Oct 5, 2016Updated 9 years ago