Generic scripts for public consumption
☆83Jul 16, 2019Updated 6 years ago
Alternatives and similar repositories for scripts
Users that are interested in scripts are comparing it to the libraries listed below
Sorting:
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- ☆35Sep 18, 2015Updated 10 years ago
- Ssdt Hook Detection tool☆13Nov 11, 2016Updated 9 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆61Oct 16, 2015Updated 10 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆437Aug 22, 2018Updated 7 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- Local Kernel Debugger (LKD) is a python wrapper around dbgengine.dll☆92Aug 22, 2016Updated 9 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- PoC of modifying HexRays AST☆265Dec 17, 2019Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- Visually Monitor Heap Allocations and Frees☆18Feb 24, 2020Updated 6 years ago
- capstone based disassembler for extracting to binnavi☆229Jun 8, 2016Updated 9 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆148Jul 30, 2017Updated 8 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- ☆15May 23, 2019Updated 6 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Dec 28, 2016Updated 9 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- VMX intrinsics plugin for Hex-Rays decompiler☆74Oct 28, 2019Updated 6 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Feb 11, 2024Updated 2 years ago
- Import an x64dbg database into a Ghidra Project☆22Aug 22, 2019Updated 6 years ago
- This contains Helpful PYKD (Python Extension for Windbg) scripts☆49Mar 9, 2015Updated 10 years ago
- Lightweight version of xpwntool just for decrypting IMG3 firmware files☆46Jan 11, 2021Updated 5 years ago
- Test Suite and exemplary extensions of the "Attacking Browser Extensions" master's thesis☆28May 22, 2016Updated 9 years ago
- An instrumentation script based on Frida which leverages Control Flow Guard to intercept indirect calls in CFG-enabled Windows binaries.☆30Jun 24, 2015Updated 10 years ago
- Basic Block Trace: DynamoRIO client☆29Dec 19, 2021Updated 4 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- covFuzz☆34Jun 8, 2017Updated 8 years ago
- Wadi Fuzzing Harness☆127Feb 6, 2017Updated 9 years ago