Robber

DLL vulnerability scanner

Tools to detect DLL hijacking vulnerabilities in executable files

Robber is open source tool for finding executables prone to DLL hijacking

GitHub

765 stars
38 watching
155 forks
Language: Pascal
last commit: over 2 years ago
candidate-dllsdelphidll-hijackingdllssecurityvulnerability-scanners

Related projects:

Repository Description Stars
ideaslocas/adll A tool for detecting DLL hijacking vulnerabilities in binaries. 70
dragokas/hijackthis Scans for and identifies malicious system modifications 699
gauravnarwani97/trishul Automated vulnerability detection tool for web applications 234
belane/linux-soft-exploit-suggester A script to identify vulnerabilities in software packages on Linux systems 222
13o-bbr-bbq/machine_learning_security A collection of tools and techniques for applying machine learning to improve security in software applications 1,979
directdefense/superserial A Burp Suite Extender to identify Java Deserialization vulnerabilities in client requests and server responses. 9
them4hd1/jcs Automated tool to identify vulnerabilities in Joomla components and generate reports 60
greggles/cracking-drupal Markdown-formatted documentation on Drupal Security vulnerabilities and mitigations 55
m0nad/hellraiser Scans networks to identify vulnerabilities by correlating CPEs with CVEs using an API 562
ke0z/vulchatgpt An IDA PRO plugin to analyze binaries for potential vulnerabilities using AI-powered decompilation and static analysis 352
hackthelegacy/hack400tool A set of tools for gathering information and exploiting vulnerabilities in IBM Power Systems 96
usscltd/dorks Automates searching for vulnerabilities in databases and websites using predefined query patterns 199
vernamlab/medusa Automated attack synthesis tool for discovering vulnerabilities in CPU architecture and cryptographic protocols 18
r0075h3ll/oralyzer A tool to identify vulnerabilities in web applications by probing for Open Redirections and other types of attacks. 753
netero1010/servicemove-bof A tool that exploits a Windows vulnerability to execute arbitrary code on remote systems using a technique called DLL hijacking. 282