sam-b / windows_syscalls_dumper
A dirty IDAPython script to dump windows system call number/name pairs as JSON
☆37Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for windows_syscalls_dumper
- ☆33Updated 9 years ago
- ☆26Updated 8 years ago
- ☆39Updated 3 years ago
- ☆26Updated 10 years ago
- ☆28Updated 7 years ago
- ☆32Updated 7 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆30Updated 7 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆53Updated 8 years ago
- A Modern Approach☆10Updated 9 years ago
- A windbg extension, extracting token related contents☆41Updated 3 years ago
- ☆34Updated 7 years ago
- Using SEH to bypass CFG☆28Updated 7 years ago
- Imports MSDN documentation into IDA Pro☆51Updated 12 years ago
- An implementation of a generic unpacker based on Intel PIN☆29Updated 8 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆53Updated 7 years ago
- My conference presentations and publications☆26Updated 2 years ago
- black hat Asia 2017 Slides☆22Updated 7 years ago
- ☆47Updated 7 years ago
- ☆31Updated 6 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆22Updated 7 years ago
- A fuzz job for ClamAV☆31Updated 8 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆71Updated 7 years ago