Seven different DLL injection techniques in one single project.
-
Updated
Apr 23, 2020 - C
{{ message }}
Seven different DLL injection techniques in one single project.
Labeless is a multipurpose IDA Pro plugin system for labels/comments synchronization with a debugger backend, with complex memory dumping and interactive Python scripting capabilities.
A sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
An integration for IDA and VS Code which connects both to easily execute and debug IDAPython scripts.
A set of tutorials about code injection for Windows.
Disassemble ANY files including .so (NDK, JNI), Windows PE(EXE, DLL, SYS, etc), linux binaries, libraries, and any other files such as pictures, audios, etc(for fun)files on Android. Capstone-based disassembler application on android. 안드로이드 NDK 공유 라이브러리, Windows 바이너리, etc,... 리버싱 앱
Tangalanga: the Zoom conference scanner hacking tool
CTF Reversing Challenges List
A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Debug Child Process Tool (auto attach)
protocol fuzzing toolkit
Reversing list
Hook WinAPI functions used by Valve Anti-Cheat. Log calls and intercept arguments & return values. DLL written in C.
Unpacking scripts for Ollydbg.
Executables created while writing "Introduction to Manual Backdooring".
reverse engineering extension plugin for windbg
WNF Utilities 4 Newbies (WNFUN)
Livro: Fundamentos de Engenharia Reversa
Rust code to show how hooking in rust with a dll works.
Polymorphic VM and PoliCTF '17 reversing challenge.
Experiments with hidden COM interface and LxBus IPC mechanism in WSL
Standalone program to download PDB Symbol files for debugging without WDK
XDV is disassembler or debugger that works based on the extension plugin.
Add a description, image, and links to the reversing topic page so that developers can more easily learn about it.
To associate your repository with the reversing topic, visit your repo's landing page and select "manage topics."
Print the following workflow: