zeroSteiner / mayhem
Runtime Process Manipulation
☆233Updated 5 months ago
Alternatives and similar repositories for mayhem
Users that are interested in mayhem are comparing it to the libraries listed below
Sorting:
- Command-line and Python debugger for instrumenting and modifying native software behavior on Windows and Linux.☆163Updated 2 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 7 years ago
- A set of exploitation/reversing aids for IDA☆421Updated 7 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆263Updated 7 years ago
- A tool to detect and crash Cuckoo Sandbox☆293Updated 9 months ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆434Updated 6 years ago
- C++ application that uses memory and code hooks to detect packers☆270Updated 7 years ago
- WinHeap Explorer repository.☆119Updated 6 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆368Updated 8 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆182Updated 6 years ago
- windows syscall table from xp ~ 10 rs4☆353Updated 6 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆145Updated 7 years ago
- GUI tool to create ROP chains using the ropper API☆156Updated 7 years ago
- Patching ROP-encoded shellcodes into PEs☆185Updated 7 years ago
- Search for code cave in all binaries☆280Updated 10 months ago
- ATrace is a tool for tracing execution of binaries on Windows.☆238Updated 8 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆132Updated 9 years ago
- PEDA-like debugger UI for WinDbg☆204Updated last year
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆295Updated 6 years ago
- An attempt at Process Doppelgänging☆182Updated 7 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Updated 4 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆150Updated 2 years ago
- WinAppDbg Debugger☆459Updated last year
- ☆91Updated 8 years ago
- Fork of mona.py with x64dbg support☆104Updated 3 years ago
- Sample use cases of the .NET native code hooking technique☆211Updated 7 years ago
- PyAna - Analyzing the Windows shellcode☆246Updated 9 years ago
- Loading unsigned code into kernel in Windows 10 (64) with help of VMware Workstation Pro/Player design flaw☆135Updated 8 years ago
- A pintool in order to unpack malware☆233Updated 8 years ago