zeroSteiner / mayhemLinks
Runtime Process Manipulation
☆236Updated 9 months ago
Alternatives and similar repositories for mayhem
Users that are interested in mayhem are comparing it to the libraries listed below
Sorting:
- Command-line and Python debugger for instrumenting and modifying native software behavior on Windows and Linux.☆164Updated 2 years ago
- A tool to detect and crash Cuckoo Sandbox☆295Updated last year
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 7 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆264Updated 8 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 7 years ago
- Fork of mona.py with x64dbg support☆105Updated 3 years ago
- Content from presentation at BHUSA 2017☆180Updated 8 years ago
- Better version of RunDll with GUI. This program allows you to load DLLs on Windows. You can select how to load the DLL. By direct Entry P…☆235Updated 10 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆239Updated 8 years ago
- Miscellaneous tools written in Python, mostly centered around shellcodes.☆148Updated 10 years ago
- Search for code cave in all binaries☆283Updated last year
- ☆165Updated 8 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Updated 4 years ago
- An attempt at Process Doppelgänging☆181Updated 7 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆183Updated 6 years ago
- Tool to make in memory man in the middle☆125Updated 6 years ago
- Ruxcon2016 POC Code☆140Updated 8 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆216Updated 5 years ago
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆276Updated 5 years ago
- C++-based shellcode builder☆115Updated 4 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆405Updated 10 years ago
- Sample use cases of the .NET native code hooking technique☆213Updated 7 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆145Updated 8 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆100Updated 6 years ago
- GUI tool to create ROP chains using the ropper API☆158Updated 7 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆170Updated 7 years ago
- ☆115Updated 9 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- ☆142Updated 8 years ago
- A Reverse Engineering Tool for py2exe applications.☆210Updated 8 years ago