tyranid / AxHellLinks
A simple exploitable ActiveX control for RE/VR
☆19Updated 10 years ago
Alternatives and similar repositories for AxHell
Users that are interested in AxHell are comparing it to the libraries listed below
Sorting:
- LD_PRELOAD rootkit☆24Updated 10 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- ☆16Updated 7 years ago
- Malware monitor template based on MinHook☆16Updated 10 years ago
- Sample libraries to be used with IAT Patcher☆33Updated 2 years ago
- radare2 script to help on COM objects reverse engineering☆11Updated 8 years ago
- Malware analyses and helpful scripts☆29Updated 3 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆11Updated 10 years ago
- repository with additional materials and source code☆32Updated 8 years ago
- Anti-AV compilation☆42Updated 11 years ago
- A simple shellcode runner☆20Updated 11 years ago
- Shellcode tracer☆15Updated 8 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Updated 8 years ago
- Debugger for HTC phones bootloader (HBOOT).☆19Updated 11 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- ☆13Updated 7 years ago
- ☆28Updated 8 years ago
- windows create process with a dll load first time via LdrHook☆30Updated 8 years ago
- ☆14Updated 9 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 10 years ago
- Collection of IDA Pro plugins I wrote over the years☆23Updated 15 years ago
- ☆24Updated 11 years ago
- Code Injector Using Code Caves☆14Updated 9 years ago
- just a basic rootkit for learning how to playing sys_call_table☆14Updated 8 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago