ohjeongwook / PublicationsView external linksLinks
☆15Jul 12, 2020Updated 5 years ago
Alternatives and similar repositories for Publications
Users that are interested in Publications are comparing it to the libraries listed below
Sorting:
- Automatically exported from code.google.com/p/timing-attestation☆13Jun 29, 2015Updated 10 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- Immunity Debugger Taint Tracer☆20Jun 18, 2013Updated 12 years ago
- Binary dynamic, static, and symbolic execution analysis tools for directed test generation☆22Nov 14, 2019Updated 6 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- A x86 Virtual Machine Monitor including device modules and instruction emulator. Standalone version of the Vancouver VMM.☆44Jun 30, 2021Updated 4 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- User-mode program parsing logs created by HyperPlatform☆18Aug 15, 2016Updated 9 years ago
- A "general-purpose" tracing tool☆39Jun 22, 2015Updated 10 years ago
- CVE-2016-3141☆15Apr 23, 2016Updated 9 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Apr 25, 2013Updated 12 years ago
- CVE-2017-5005 for Quick Heal Antivirus☆15Mar 31, 2017Updated 8 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Mar 12, 2014Updated 11 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- Simple GTK GUI program to transfer books to iPad, share files to/from compatible apps, and screenshot iDevices. Tested on Ubuntu with lib…☆15Sep 17, 2016Updated 9 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- Implementation of a thin hypervisor☆43May 20, 2016Updated 9 years ago
- XED based Disassembly Engine☆21Apr 23, 2018Updated 7 years ago
- Extract LZMA sections from cable modem firmware images☆20Nov 18, 2013Updated 12 years ago
- ☆14Feb 27, 2017Updated 8 years ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Jul 30, 2016Updated 9 years ago
- A project that aims to automatically devirtualize code that has been virtualized using x86virt☆126Dec 3, 2022Updated 3 years ago
- x64 Windows Software Fault Injection Tool☆17Dec 2, 2017Updated 8 years ago
- A simple python packet sniffer and manipulation tool for linux☆18Nov 26, 2015Updated 10 years ago
- Demo bootloaders - created just for fun☆23Jul 1, 2017Updated 8 years ago
- IDA反-反调试插件 IDAStealth v1.3.3, created 06/28/2011, Jan Newger☆21Apr 4, 2018Updated 7 years ago
- IDAPython plugin for finding Xrefs from a function☆48Jul 14, 2016Updated 9 years ago
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- Grep-like WinDbg extension☆45Apr 7, 2017Updated 8 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22May 31, 2017Updated 8 years ago
- Plugins for the Volatility framework☆18Oct 30, 2015Updated 10 years ago