rrbranco / blackhat2012
Blackhat 2012 Sample Codes
☆92Updated 8 years ago
Alternatives and similar repositories for blackhat2012:
Users that are interested in blackhat2012 are comparing it to the libraries listed below
- ☆74Updated 7 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆37Updated 11 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 7 years ago
- Load a Windows Kernel Driver☆90Updated 7 years ago
- Static unpacker for FinSpy VM☆97Updated 3 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆96Updated 12 years ago
- Collection Of Anti-Debugging Tricks☆99Updated 9 years ago
- Parsers for custom malware formats ("Funky malware formats")☆92Updated 3 years ago
- ☆115Updated 12 years ago
- DLL Injection Library & Tools☆71Updated 8 years ago
- TDL4 style rootkit to spoof read/write requests to master boot record☆130Updated 7 years ago
- Bootkits Revisited☆41Updated 10 years ago
- KINS Banking Trojan☆62Updated 9 years ago
- Driver Initial Reconnaissance Tool☆121Updated 5 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆93Updated 3 years ago
- Security Research and Development Framework☆106Updated 9 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆76Updated 9 years ago
- kernel exploitation helper class☆75Updated 8 years ago
- ☆91Updated 8 years ago
- IDA Plugin which decodes Windows Device I/O control code into DeviceType, FunctionCode, AccessType and MethodType.☆107Updated last year
- Transfer EIP control to shellcode during malware analysis investigation☆74Updated 10 years ago
- A library for intercepting native functions by hooking KiFastSystemCall☆72Updated 4 years ago
- Automatically rebuild Import Address Table for dumped PE file. With python bindings!☆116Updated 5 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub☆76Updated 12 years ago
- Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.☆75Updated 4 years ago
- Python scripts for reverse engineering.☆181Updated 3 years ago