zenhumany / hitcon2015View external linksLinks
Microsoft Edge MemGC Internals
☆17Sep 2, 2015Updated 10 years ago
Alternatives and similar repositories for hitcon2015
Users that are interested in hitcon2015 are comparing it to the libraries listed below
Sorting:
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- ☆11Jun 10, 2015Updated 10 years ago
- A future hobby OS kernel☆11Nov 8, 2020Updated 5 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- exploit development☆49Mar 14, 2018Updated 7 years ago
- ☆12May 8, 2017Updated 8 years ago
- 一个微型的操作系统☆12Nov 10, 2021Updated 4 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆14Mar 26, 2015Updated 10 years ago
- 010 Editor Template for parsing VMware Disk(vmdk) images☆16Sep 12, 2018Updated 7 years ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- PE Infector/Cryptor source code☆16Apr 30, 2017Updated 8 years ago
- ☆15Dec 26, 2017Updated 8 years ago
- ☆15Mar 8, 2017Updated 8 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Oct 10, 2014Updated 11 years ago
- A dns server that use to hijack other dns request in a wifi network for redirect to your custem http server ..☆19Jun 25, 2015Updated 10 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆15Sep 19, 2015Updated 10 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Dec 12, 2014Updated 11 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- Automatically exported from code.google.com/p/wskudp☆13Jun 29, 2017Updated 8 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆50Apr 6, 2018Updated 7 years ago
- ☆24Feb 21, 2016Updated 9 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Jul 25, 2014Updated 11 years ago
- xStl is a cross-compile, cross-platform C++ library that implements a set of generic templates for easy development.☆17Mar 15, 2017Updated 8 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- Malware monitor template based on MinHook☆17Mar 29, 2015Updated 10 years ago
- Https中间人劫持验证性库☆17Mar 12, 2017Updated 8 years ago
- ☆25Apr 8, 2016Updated 9 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago