findLoop - find possible encryption/decryption or compression/decompression code
☆28Mar 30, 2019Updated 6 years ago
Alternatives and similar repositories for findLoop
Users that are interested in findLoop are comparing it to the libraries listed below
Sorting:
- IDAPro scripts/plugins☆93Feb 26, 2019Updated 7 years ago
- vm -- code interpreter☆25Apr 8, 2019Updated 6 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago
- x64dbg scripts for finding OEP of packers☆15Oct 22, 2018Updated 7 years ago
- Modular binary injection framework☆18Jan 6, 2020Updated 6 years ago
- A small utility to grep for pointers & binary data in memory dumps / live process memory☆24Jul 16, 2018Updated 7 years ago
- My RE challenge from Northsec 2018.☆14Jun 1, 2022Updated 3 years ago
- Intel Virtualization Technology demo☆72Oct 15, 2016Updated 9 years ago
- User-mode part of Zerokit platform☆22Mar 30, 2019Updated 6 years ago
- ☆46Jun 14, 2018Updated 7 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Sep 9, 2020Updated 5 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Aug 17, 2019Updated 6 years ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- ☆92Apr 17, 2021Updated 4 years ago
- Kernel Detective☆151Mar 7, 2026Updated last week
- Dump mapped PE files from memory to the disk☆20Jun 28, 2019Updated 6 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- My articles for Paged Out! #2☆17Nov 20, 2019Updated 6 years ago
- WhoCalls can query a directory of files, find the binaries, and search for a user specified Win API import. It and works with both 32-bit…☆18Jul 2, 2022Updated 3 years ago
- Example of hijacking system calls via function pointer tables☆31Jun 26, 2021Updated 4 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- Frida depends on Vala☆11Feb 16, 2026Updated last month
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Oct 10, 2019Updated 6 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Writeups of CTF challenges I do☆13Sep 29, 2019Updated 6 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Oct 23, 2019Updated 6 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- ☆14Oct 5, 2019Updated 6 years ago
- The place where my HackSys Extreme Vulnerable Driver exploits go.☆25Oct 21, 2018Updated 7 years ago
- hook detector using emulation and comparing static with dynamic outputs☆17Aug 11, 2023Updated 2 years ago
- ☆21Jan 7, 2019Updated 7 years ago
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆94Feb 24, 2019Updated 7 years ago
- The Demo for CVE-2018-1000006☆39Jan 25, 2018Updated 8 years ago
- Self-modifying Code de-obfuscation☆17May 17, 2017Updated 8 years ago
- Windows Server 2K3 NT 5☆12Apr 14, 2021Updated 4 years ago
- Demonstrate the new FileDispositionInfoEx behavior☆15Nov 6, 2017Updated 8 years ago