zeroSteiner / mayhemLinks
Runtime Process Manipulation
☆234Updated 6 months ago
Alternatives and similar repositories for mayhem
Users that are interested in mayhem are comparing it to the libraries listed below
Sorting:
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 7 years ago
- A tool to detect and crash Cuckoo Sandbox☆295Updated 10 months ago
- WinAppDbg Debugger☆460Updated last year
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆182Updated 6 years ago
- Fork of mona.py with x64dbg support☆103Updated 3 years ago
- Search for code cave in all binaries☆282Updated 10 months ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 7 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆264Updated 7 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆238Updated 8 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆368Updated 8 years ago
- ☆115Updated 8 years ago
- Windows Shortcut file (LNK) parser☆134Updated 2 years ago
- Sample use cases of the .NET native code hooking technique☆212Updated 7 years ago
- Command-line and Python debugger for instrumenting and modifying native software behavior on Windows and Linux.☆163Updated 2 years ago
- Windows API tracer for malware (oldname: unitracer)☆118Updated 7 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆216Updated 4 years ago
- An attempt at Process Doppelgänging☆181Updated 7 years ago
- C++ application that uses memory and code hooks to detect packers☆270Updated 7 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆164Updated 8 years ago
- Content from presentation at BHUSA 2017☆180Updated 7 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- GUI tool to create ROP chains using the ropper API☆155Updated 7 years ago
- PyAna - Analyzing the Windows shellcode☆246Updated 9 years ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆282Updated 7 years ago
- Patching ROP-encoded shellcodes into PEs☆186Updated 7 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- A set of exploitation/reversing aids for IDA☆420Updated 7 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆99Updated 5 years ago
- Miscellaneous tools written in Python, mostly centered around shellcodes.☆146Updated 9 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆145Updated 7 years ago