zeroSteiner / mayhem
Runtime Process Manipulation
☆231Updated 2 months ago
Alternatives and similar repositories for mayhem:
Users that are interested in mayhem are comparing it to the libraries listed below
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 6 years ago
- WinAppDbg Debugger☆452Updated last year
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆263Updated 7 years ago
- A set of tutorials about code injection for Windows.☆309Updated 5 months ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆426Updated 6 years ago
- A tool to detect and crash Cuckoo Sandbox☆289Updated 6 months ago
- Search for code cave in all binaries☆276Updated 6 months ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆149Updated 7 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆181Updated 5 years ago
- Fork of mona.py with x64dbg support☆99Updated 2 years ago
- A set of exploitation/reversing aids for IDA☆415Updated 7 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆147Updated last year
- Content from presentation at BHUSA 2017☆180Updated 7 years ago
- Command-line and Python debugger for instrumenting and modifying native software behavior on Windows and Linux.☆162Updated last year
- An attempt at Process Doppelgänging☆183Updated 7 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆84Updated 2 years ago
- ☆231Updated 7 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆212Updated 4 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆361Updated 7 years ago
- ☆112Updated 8 years ago
- Incident Response & Digital Forensics Debugging Extension☆374Updated 6 years ago
- Patching ROP-encoded shellcodes into PEs☆184Updated 7 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆132Updated 9 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆151Updated 3 years ago
- windows syscall table from xp ~ 10 rs4☆351Updated 6 years ago
- C++ application that uses memory and code hooks to detect packers☆270Updated 6 years ago
- Windows Shortcut file (LNK) parser☆135Updated 2 years ago
- Script analysis tool based on Frida.re☆128Updated 7 years ago
- PEDA-like debugger UI for WinDbg☆201Updated 10 months ago
- Sample use cases of the .NET native code hooking technique☆207Updated 6 years ago