sensepost / frida-windows-playgroundLinks
A collection of Frida hooks for experimentation on Windows platforms.
☆101Updated 6 years ago
Alternatives and similar repositories for frida-windows-playground
Users that are interested in frida-windows-playground are comparing it to the libraries listed below
Sorting:
- A repository for my conference presentations☆35Updated 5 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆68Updated 5 years ago
- All the materials in BlueHat 2019 Seattle will be realeased here.☆69Updated 5 years ago
- The slides from my Saintcon 2019 talk.☆48Updated 5 years ago
- ☆46Updated 6 years ago
- The place where my HackSys Extreme Vulnerable Driver exploits go.☆25Updated 7 years ago
- ☆45Updated 8 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 6 years ago
- GUI Application in C# to run and disassemble shellcode☆36Updated 8 years ago
- Frida example to trace VBA CreateObject calls and some string deobfuscations calls. You need latest Frida 12.9.8 for improved symbol look…☆25Updated 5 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆14Updated 5 years ago
- Windows EoP Bugs☆127Updated 5 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆86Updated 6 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆95Updated 6 years ago
- ☆49Updated 6 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 6 years ago
- ASLR bypass in Chrome version 77☆24Updated 5 years ago
- Enumerate URL schemes on macOS and Windows☆45Updated last year
- Building optimized shellcode using GCC. Suited for learning assembly and playing with the ABI☆77Updated 7 years ago
- CVE-2019-9729. Transferred from https://github.com/DoubleLabyrinth/SdoKeyCrypt-sys-local-privilege-elevation☆83Updated 6 years ago
- ☆26Updated 7 years ago
- Code for diskless loading of ELF Shared Library using Reflective DLL Injection☆53Updated 9 years ago
- BlazeFox Exploit☆18Updated 7 years ago
- A windbg extension for ASLR/DEP/SafeSEH check☆27Updated 7 years ago
- Qiling Advanced Binary Emulation framework☆12Updated 6 years ago
- ☆135Updated 5 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Updated 5 years ago
- ☆79Updated 8 months ago
- CTF binary exploit code☆38Updated 6 years ago