zynamics / msdn-crawlerLinks
Parses MSDN documentation into an XML file
☆31Updated 13 years ago
Alternatives and similar repositories for msdn-crawler
Users that are interested in msdn-crawler are comparing it to the libraries listed below
Sorting:
- Imports MSDN documentation into IDA Pro☆52Updated 13 years ago
- ☆27Updated 3 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Updated 4 years ago
- ☆91Updated 9 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆92Updated 9 years ago
- kernel exploitation helper class☆77Updated 9 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 9 years ago
- OpenType font file format fuzzer for Windows☆52Updated 12 years ago
- Local Kernel Debugger (LKD) is a python wrapper around dbgengine.dll☆92Updated 9 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- Bootkits Revisited☆40Updated 11 years ago
- IDASimulator is a plugin that extends IDA's conditional breakpoint support, making it easy to augment / replace complex executable code i…☆46Updated 11 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Updated 9 years ago
- Binary Analysis Platform☆74Updated 12 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- Intercept arbitrary functions at run-time, without knowing their typedefs☆88Updated 8 years ago
- Code coverage analysis tools for the PIN Toolkit☆60Updated 12 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36Updated 9 years ago
- ☆35Updated 10 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Updated 13 years ago
- A few IDAPython scripts to generate class hierarchy diagrams from IDBs☆35Updated 13 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 10 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 10 years ago
- ☆32Updated last year
- Collection of tools for the Pin dynamic instrumentation framework☆42Updated 5 years ago
- zer0m0n driver for cuckoo sandbox☆24Updated 10 years ago
- Generic scripts for public consumption☆85Updated 6 years ago
- IDATACO IDA Pro Plugin☆47Updated 9 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Updated 11 years ago