silentsignal / heureka
A toolset to assess the behavioral capabilities of AV/HIPS software
☆8Updated 11 years ago
Alternatives and similar repositories for heureka:
Users that are interested in heureka are comparing it to the libraries listed below
- ☆10Updated 7 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆14Updated 7 years ago
- ☆10Updated 10 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 7 years ago
- Assembly code to use for Windows kernel shellcode to edit winlogon.exe ACL☆13Updated 8 years ago
- CVE-2014-0816☆24Updated 8 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Updated 9 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow with Stack Cookie Bypass Exploit☆18Updated 8 years ago
- ☆28Updated 7 years ago
- Internet Explorer MemoryProtection Mitigation☆32Updated 10 years ago
- ☆22Updated 7 years ago
- Anti-AV compilation☆42Updated 11 years ago
- ☆12Updated 7 years ago
- reverse win7 32bit hotpatch implement☆9Updated 11 years ago
- Debug Bootkit Tool Source☆9Updated 7 years ago
- ☆22Updated 7 years ago
- PIN Tool for monitoring calls and writes from obfuscated code.☆26Updated 5 years ago
- reversed emet tool☆24Updated 12 years ago
- Kernel-mode file scanner☆18Updated 6 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆31Updated 8 years ago
- ☆18Updated 7 years ago
- 微软7月布丁增加内存延迟释放机制☆11Updated 10 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- ☆34Updated 7 years ago
- ☆33Updated 7 years ago
- OpenHIPS prevents exploitation of Windows systems☆33Updated 12 years ago
- Malwarebytes Antivirus CVE☆8Updated 7 years ago
- ☆14Updated 7 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆34Updated 6 years ago