zeroSteiner / mayhem
Runtime Process Manipulation
☆230Updated last year
Related projects ⓘ
Alternatives and complementary repositories for mayhem
- A tool to detect and crash Cuckoo Sandbox☆288Updated 3 months ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆180Updated 5 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆312Updated 6 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆263Updated 7 years ago
- Content from presentation at BHUSA 2017☆179Updated 7 years ago
- WinAppDbg Debugger☆444Updated last year
- Cminer is a tool for enumerating the code caves in PE files.☆143Updated last year
- Command-line and Python debugger for instrumenting and modifying native software behavior on Windows and Linux.☆161Updated last year
- Search for code cave in all binaries☆276Updated 4 months ago
- Script analysis tool based on Frida.re☆128Updated 7 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆148Updated 7 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆359Updated 7 years ago
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆269Updated 5 years ago
- A set of exploitation/reversing aids for IDA☆415Updated 6 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆98Updated 5 years ago
- An attempt at Process Doppelgänging☆183Updated 6 years ago
- WinHeap Explorer repository.☆119Updated 6 years ago
- DriverBuddy is an IDA Python script to assist with the reverse engineering of Windows kernel drivers.☆352Updated 4 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆132Updated 8 years ago
- Incident Response & Digital Forensics Debugging Extension☆371Updated 5 years ago
- A set of tutorials about code injection for Windows.☆305Updated 2 months ago
- Hardcore corruption of my execve() vulnerability in WSL☆214Updated 6 years ago
- ☆112Updated 8 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆116Updated 2 weeks ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- Persistent IAT hooking application - based on bearparser☆247Updated 2 years ago