Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"
☆69Mar 7, 2022Updated 4 years ago
Alternatives and similar repositories for quincy
Users that are interested in quincy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform☆117Nov 19, 2017Updated 8 years ago
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- rVMI - A New Paradigm For Full System Analysis☆359Oct 4, 2017Updated 8 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Aug 4, 2014Updated 11 years ago
- midfunction d3d basehook for winxp, win7, win8, win10☆17Jan 21, 2019Updated 7 years ago
- Synesthesia, implemented as Yices scripts☆94Jul 17, 2017Updated 8 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 9 years ago
- Simple high-interactive client honeypot☆25Oct 15, 2017Updated 8 years ago
- ☆81Jun 12, 2017Updated 8 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Jan 18, 2017Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- PEDA-like debugger UI for WinDbg☆207Mar 29, 2024Updated 2 years ago
- Malware sandbox evasion tricks and solution☆32Jul 5, 2017Updated 8 years ago
- ☆46Apr 6, 2017Updated 9 years ago
- ☆24Sep 26, 2017Updated 8 years ago
- Win32 Keyboard Layout Experiments☆20Mar 3, 2013Updated 13 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆296Sep 30, 2023Updated 2 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys