86hh / POC-viruses
POC viruses I have created to demo some ideas
☆59Updated 4 years ago
Alternatives and similar repositories for POC-viruses:
Users that are interested in POC-viruses are comparing it to the libraries listed below
- Tools for instrumenting Windows Defender's mpengine.dll☆36Updated 6 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 6 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- Flare-On solutions☆36Updated 5 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 4 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- Parsers for custom malware formats ("Funky malware formats")☆93Updated 3 years ago
- ☆51Updated 7 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆42Updated last year
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- Control Flow Guard Teleportation demo☆23Updated 5 years ago
- A windbg extension for ASLR/DEP/SafeSEH check☆25Updated 6 years ago
- ☆50Updated 7 years ago
- SentinelOne's KeRnel Exploits Advanced Mitigations☆52Updated 6 years ago
- ☆83Updated last year
- Automatically exported from code.google.com/p/narly☆22Updated 3 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆48Updated 4 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 5 years ago
- Process reimaging proof of concept code☆95Updated 5 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 4 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆93Updated 3 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- A tool to exploit .NET DCOM for EoP and RCE. Is fixed in latest versions of the .NET.☆87Updated 10 years ago
- ☆48Updated 4 years ago
- Public repository for HEVD exploits☆20Updated 6 years ago
- Driver Initial Reconnaissance Tool☆121Updated 5 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆116Updated 6 years ago
- ☆49Updated 4 years ago
- ☆43Updated 6 years ago