sam-b / windows_syscalls_dumper
A dirty IDAPython script to dump windows system call number/name pairs as JSON
☆37Updated 8 years ago
Alternatives and similar repositories for windows_syscalls_dumper:
Users that are interested in windows_syscalls_dumper are comparing it to the libraries listed below
- ☆33Updated 9 years ago
- ☆26Updated 8 years ago
- ☆39Updated 3 years ago
- A fuzz job for ClamAV☆31Updated 8 years ago
- ☆28Updated 7 years ago
- My conference presentations and publications☆26Updated 3 years ago
- Using SEH to bypass CFG☆29Updated 7 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆31Updated 9 years ago
- ☆34Updated 7 years ago
- Large Scale Cumulative Binary Diffing.☆25Updated 7 years ago
- ☆50Updated 7 years ago
- A windbg extension, extracting token related contents☆41Updated 4 years ago
- A Modern Approach☆10Updated 9 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago
- An implementation of a generic unpacker based on Intel PIN☆29Updated 8 years ago
- Imports MSDN documentation into IDA Pro☆51Updated 13 years ago
- ☆26Updated 10 years ago
- ☆27Updated 3 years ago
- ☆22Updated 7 years ago
- black hat Asia 2017 Slides☆22Updated 7 years ago
- ☆22Updated 7 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆55Updated 8 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆31Updated 8 years ago
- ☆34Updated 7 years ago
- Automated library compilation and PDB annotation with CMake and IDA Pro☆20Updated 6 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Updated 10 years ago
- A static Internet Explorer Fuzzer.☆50Updated 7 years ago