ohjeongwook / REPackLinks
Reverse engineering toolkit for exploit/malware analysis
☆35Updated 5 years ago
Alternatives and similar repositories for REPack
Users that are interested in REPack are comparing it to the libraries listed below
Sorting:
- ☆15Updated 6 years ago
- ☆17Updated 6 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 8 years ago
- ☆22Updated 6 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Updated 6 years ago
- Malware analysis tool based on taint analysis.☆14Updated 3 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Updated 6 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- ☆14Updated 7 years ago
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 7 years ago
- vm -- code interpreter☆25Updated 6 years ago
- expansion of afl-unicorn using c++☆28Updated 5 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Updated 7 years ago
- keynote I gave at GreHack 2019☆18Updated 5 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Updated 7 years ago
- ☆11Updated 6 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 8 years ago
- A tool that allows you to assemble and emulate assembly in multiple archs for learning purposes☆13Updated 6 years ago
- Kernel-mode file scanner☆18Updated 6 years ago
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Updated 5 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Browser Fuzzing with Machine Learning☆22Updated 6 years ago
- KernelBugTest☆15Updated 7 years ago