yiwiz-sai / pyInspector
python inspect rootkit tool
☆34Updated 11 years ago
Alternatives and similar repositories for pyInspector:
Users that are interested in pyInspector are comparing it to the libraries listed below
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Updated 11 years ago
- Internet Explorer MemoryProtection Mitigation☆32Updated 10 years ago
- ☆28Updated 7 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 7 years ago
- Misc Python tools or PoCs. Mainly focused in helping RE, fuzzing☆20Updated 12 years ago
- ☆26Updated 8 years ago
- ☆33Updated 9 years ago
- CVE-2014-0816☆24Updated 8 years ago
- x64 Windows Software Fault Injection Tool☆17Updated 7 years ago
- Malpimp is an advanced API tracing tool and designed to automate the reverse engineering process. In the backend it uses pydbg to hook t…☆8Updated 8 years ago
- ☆15Updated 4 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Updated 9 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Updated 12 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆41Updated 11 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Updated 10 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆33Updated 8 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- Flash Exploit Detector☆7Updated 9 years ago
- Fetch and set configuration values from IDAPython scripts☆20Updated 4 years ago
- Collection of IDA Pro plugins I wrote over the years☆23Updated 14 years ago
- Fuzz testing framework for security research☆30Updated 10 years ago
- Shellcode tracer☆15Updated 8 years ago
- Using SEH to bypass CFG☆29Updated 7 years ago