ynadji / peidLinks
☆19Updated 9 years ago
Alternatives and similar repositories for peid
Users that are interested in peid are comparing it to the libraries listed below
Sorting:
- ☆24Updated 11 years ago
- A PowerShell binding for the Unicorn Engine☆17Updated 9 years ago
- Ida Pro Ultimate Qt Build Guide☆26Updated 6 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago
- ☆28Updated 3 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Updated 9 years ago
- A malware sandoxed with gdb☆15Updated 8 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Updated 9 years ago
- ☆21Updated 8 years ago
- Malpimp is an advanced API tracing tool and designed to automate the reverse engineering process. In the backend it uses pydbg to hook t…☆8Updated 8 years ago
- Using Deviare to Cheat on Games: Intercepting Direct3D COM objects and making walls invisible☆14Updated 11 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Updated 9 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Updated 9 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Updated 12 years ago
- RemoteBridge is a library that allows you to access internal COM and JAVA objects used by third-party applications remotely.☆34Updated 7 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 8 years ago
- IDA plugin to patch IDA Pro in memory.☆49Updated 8 years ago
- A simple exploitable ActiveX control for RE/VR☆19Updated 10 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- ☆24Updated 9 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- Random Code Store☆17Updated 2 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆34Updated 9 years ago
- Little Ida pro gimmick, to use pip from python.☆10Updated 9 years ago
- Basic file metadata gathering script☆21Updated last month
- IDA Pro MSDN Helper☆39Updated 8 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Updated 10 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago