sam-b / windows_syscalls_dumper
A dirty IDAPython script to dump windows system call number/name pairs as JSON
☆37Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for windows_syscalls_dumper
- ☆33Updated 9 years ago
- ☆26Updated 8 years ago
- ☆39Updated 3 years ago
- Automated library compilation and PDB annotation with CMake and IDA Pro☆20Updated 6 years ago
- A fuzz job for ClamAV☆31Updated 8 years ago
- My conference presentations and publications☆26Updated 2 years ago
- Analysis PE file or Shellcode☆48Updated 8 years ago
- Large Scale Cumulative Binary Diffing.☆25Updated 6 years ago
- ☆28Updated 7 years ago
- black hat Asia 2017 Slides☆22Updated 7 years ago
- ☆26Updated 10 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆53Updated 7 years ago
- ☆27Updated 2 years ago
- ☆46Updated 7 years ago
- Collection of pin tools☆50Updated 8 years ago
- A windbg extension, extracting token related contents☆41Updated 3 years ago
- Imports MSDN documentation into IDA Pro☆51Updated 12 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- Automatically exported from code.google.com/p/ioctlbf☆16Updated 9 years ago
- A Modern Approach☆10Updated 9 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆22Updated 7 years ago
- ☆22Updated 7 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆53Updated 8 years ago
- A pin tool to visualise heap operations☆21Updated 9 years ago