tyranid / AxHell
A simple exploitable ActiveX control for RE/VR
☆19Updated 10 years ago
Alternatives and similar repositories for AxHell:
Users that are interested in AxHell are comparing it to the libraries listed below
- radare2 script to help on COM objects reverse engineering☆11Updated 7 years ago
- Shellcode tracer☆15Updated 8 years ago
- A simple shellcode runner☆20Updated 10 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Anti-AV compilation☆42Updated 11 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Updated 9 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- ☆16Updated 7 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- Sample libraries to be used with IAT Patcher☆33Updated 2 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- If you want to exploit some kernel overflows, I've designed (long time ago) several levels ; have fun!☆8Updated 13 years ago
- ☆28Updated 7 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- ☆27Updated 3 years ago
- ☆24Updated 11 years ago
- Debugger for HTC phones bootloader (HBOOT).☆19Updated 11 years ago
- Malpimp is an advanced API tracing tool and designed to automate the reverse engineering process. In the backend it uses pydbg to hook t …☆8Updated 8 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 9 years ago
- repository with additional materials and source code☆30Updated 8 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆42Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- A PowerShell binding for the Unicorn Engine☆17Updated 9 years ago
- DLL to use the power of Pafish☆32Updated 3 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Updated 8 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 9 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago