• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

memory

  1. itsMe

    C/C++ Heap_Detective: detect heap memory pitfalls in C++ and C

    This tool uses the taint analysis technique for static analysis and aims to identify points of heap memory usage vulnerabilities in C and C++ languages. The tool uses a common approach in the first phase of static analysis, using tokenization to collect information. The second phase has a...
  2. D

    Foundations of ARM64 Linux Debugging, Disassembling, and Reversing: Analyze Code, Understand Stack Memory Usage, and Reconstruct Original C/C++ Code w

    Gain a solid understanding of how Linux C and C++ compilers generate binary code. This book explains the reversing and binary analysis of ARM64 architecture now used by major Linux cloud providers and covers topics ranging from writing programs in assembly language, live debugging, and static...
  3. itsMe

    Msmap v0.7 - Memory WebShell Generator

    Msmap is a Memory WebShell Generator. Compatible with various Containers, Components, Encoder, WebShell / Proxy / Killer, and Management Clients. Function      Dynamic Menu      Automatic Compilation      Generate Script      Lite Mode      Graphical Interface Container     Java        ...
  4. itsMe

    AceLdr - Cobalt Strike UDRL For Memory Scanner Evasion

    Features Easy to Use Import a single CNA script before generating shellcode. Dynamic Memory Encryption Creates a new heap for any allocations from Beacon and encrypts entries before sleep. Code Obfuscation and Encryption Changes the memory containing CS executable code to non-executable...
  5. itsMe

    MSMAP - Memory WebShell Generator

    Msmap is a Memory WebShell Generator. Compatible with various Containers, Components, Encoder, WebShell / Proxy / Killer and Management Clients. 简体中文 Hidden content
  6. itsMe

    AceLdr: Cobalt Strike UDRL for memory scanner evasion

    A position-independent reflective loader for Cobalt Strike. Zero results from Hunt-Sleeping-Beacons, BeaconHunter, BeaconEye, Patriot, Moneta, PE-sieve, or MalMemDetect. Features Easy to Use Import a single CNA script before generating shellcode. Dynamic Memory Encryption Creates a new heap...
  7. itsMe

    Msmap: Memory WebShell Generator

    Msmap is a Memory WebShell Generator. Compatible with various Containers, Components, Encoder, WebShell / Proxy / Killer, and Management Clients. Function      Dynamic Menu      Automatic Compilation      Generate Script      Lite Mode      Graphical Interface Container     Java...
  8. itsMe

    Reverse Engineering FRIDA-DEXDump v2.0.1 - Fast search and dump dex on memory

    FRIDA-DEXDump Fast search and dump dex on memory Features     support fuzzy search broken header dex.     fix struct data of dex-header.     compatible with all android versions (Frida supported).     support loading as objection plugin ~     pypi package has been released ~ Changelog v2.0.1...
  9. itsMe

    Reverse Engineering Drmemory v2.5.18954 - Memory Debugger for Windows, Linux, Mac, and Android

    Dr. Memory: the memory debugger Dr. Memory is a memory monitoring tool capable of identifying memory-related programming errors such as accesses of uninitialized memory, accesses to unaddressable memory (including outside of allocated heap units and heap underflow and overflow), accesses to...
  10. itsMe

    Windows Memory Cleaner v1.1

    This is a RAM cleaner. There are times when programs do not release the memory they used, making the machine slow, but you don’t want to restart the system to get the used memory back. This is where you use Windows Memory Cleaner to clean your memory, so you can carry on working without wasting...
  11. itsMe

    Reverse Engineering Reverse Engineering and Memory Hacking with Cheat Engine

    What you'll learn     Debug programs with Cheat Engine     Reverse engineer programs     Solve CrackMe challenges     Disassemble programs into assembly code     Setting breakpoints and stepping through code     Modify program behaviour     Hacking and patching process memory     Code Injection...
  12. dEEpEst

    Crypter Crypter C++ LVL23N14 (3/22) / injected into memory /

    Crypter C++ LVL23N14 (3/22) / injected into memory /   Tutorial: The folder contains these files   We open Builder.exe and it will ask us for the name of the file in encrypter, in my case it is server.exe, so we drag our server.exe to the window of our Builder.exe (ATTENTION: the file...
  13. 1

    Exploits WinRAR 5.80 Memory Corruption

    WinRAR version 5.80 suffers from a memory corruption vulnerability that allows for denial of service. View the full article
  14. 1

    Exploits Adobe Acrobat Reader DC For Windows Malformed TTF Font Memory Corruption

    Adobe Acrobat Reader DC for Windows suffers from a heap-based memory corruption vulnerability due to a malformed TTF font. View the full article
  15. 1

    Exploits Adobe Acrobat CoolType (AFDKO) Type 1 Font Uninitialized Memory Issue

    Adobe Acrobat CoolType (AFDKO) performs a call from uninitialized memory due to an empty FDArray in Type 1 fonts. View the full article
  16. 1

    Exploits Adobe Acrobat CoolType (AFDKO) Type 1 Font Memory Corruption

    Adobe Acrobat CoolType (AFDKO) suffers from a memory corruption vulnerability in the handling of Type 1 font load/store operators. View the full article
  17. 1

    Exploits iMessage NSKnownKeysDictionary1 Memory Corruption

    iMessage suffers from a memory corruption vulnerability when decoding NSKnownKeysDictionary1. View the full article
  18. 1

    Exploits Microsoft DirectWrite / AFDKO Uninitialized Memory Use

    Microsoft DirectWrite / AFDKO suffers from an issue where it makes use of uninitialized memory while freeing resources in var_loadavar. View the full article
  19. 1

    Exploits Shekar Endoscope Weak Default Settings / Memory Corruption

    Shekar Endoscope has telnet enabled by default, default wifi credentials, a flaw where an attacker can change the wifi password without any additional authentication, and four memory corruption vulnerabilities. View the full article
  20. 1

    Exploits Blipcare Clear Text Communication / Memory Corruption

    Blipcare web services suffer from having traffic in clear text, open wifi, and memory corruption vulnerabilities. View the full article
Back
Top