zeroSteiner / mayhemLinks
Runtime Process Manipulation
☆236Updated 10 months ago
Alternatives and similar repositories for mayhem
Users that are interested in mayhem are comparing it to the libraries listed below
Sorting:
- Command-line and Python debugger for instrumenting and modifying native software behavior on Windows and Linux.☆164Updated 2 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆240Updated 9 years ago
- Content from presentation at BHUSA 2017☆180Updated 8 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 7 years ago
- A tool to detect and crash Cuckoo Sandbox☆295Updated last year
- Tool to make in memory man in the middle☆125Updated 7 years ago
- Fork of mona.py with x64dbg support☆105Updated 3 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆264Updated 8 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Updated 4 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆183Updated 6 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 8 years ago
- ☆165Updated 8 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆146Updated 8 years ago
- Sample use cases of the .NET native code hooking technique☆213Updated 7 years ago
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆276Updated 5 years ago
- Better version of RunDll with GUI. This program allows you to load DLLs on Windows. You can select how to load the DLL. By direct Entry P…☆235Updated 10 years ago
- Search for code cave in all binaries☆285Updated last year
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆85Updated 3 years ago
- WinHeap Explorer repository.☆119Updated 7 years ago
- A novel technique to hide code from debuggers & disassemblers☆157Updated last year
- Useful Scripts for helping in reverse engeenering☆180Updated 5 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- Miscellaneous tools written in Python, mostly centered around shellcodes.☆148Updated 10 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆119Updated 11 months ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- GUI tool to create ROP chains using the ropper API☆157Updated 7 years ago
- An attempt at Process Doppelgänging☆181Updated 7 years ago
- C++-based shellcode builder☆115Updated 4 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆405Updated 10 years ago
- Ruxcon2016 POC Code☆141Updated 8 years ago