toufikairane / ReverseEngineering
☆31Updated this week
Related projects: ⓘ
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆41Updated 11 years ago
- ☆50Updated 8 years ago
- Anti-AV compilation☆42Updated 10 years ago
- ☆28Updated 7 years ago
- ☆16Updated this week
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 11 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆36Updated 10 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 8 years ago
- An implementation of a generic unpacker based on Intel PIN☆29Updated 8 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆36Updated 7 years ago
- OllyHeapTrace is a plugin for OllyDbg to trace the heap operations being performed by a process.☆53Updated 12 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 9 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆34Updated 8 years ago
- Windows kernel vulnerability in win32k.sys Driver☆34Updated 8 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Updated 12 years ago
- ☆26Updated 8 years ago
- ☆17Updated this week
- Imports MSDN documentation into IDA Pro☆51Updated 12 years ago
- ☆33Updated 9 years ago
- CVE-2014-0816☆24Updated 7 years ago
- Analysis PE file or Shellcode☆48Updated 8 years ago
- Malpimp is an advanced API tracing tool and designed to automate the reverse engineering process. In the backend it uses pydbg to hook t…☆8Updated 8 years ago
- ☆42Updated this week
- ☆32Updated 7 years ago
- Automatically exported from code.google.com/p/ioctlbf☆16Updated 9 years ago
- ☆27Updated this week
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 7 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆49Updated 6 years ago
- Simple standalone bundle of NT core APIs☆25Updated 8 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆91Updated 8 years ago