Cr4sh / secretnet_explLinks
LPE exploits for Secret Net and Secret Net Studio
☆50Updated 9 years ago
Alternatives and similar repositories for secretnet_expl
Users that are interested in secretnet_expl are comparing it to the libraries listed below
Sorting:
- repository with additional materials and source code☆32Updated 8 years ago
- ☆34Updated 9 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆64Updated 10 years ago
- ☆26Updated 8 years ago
- ☆32Updated 11 months ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆42Updated 8 years ago
- hidusb.sys source code, Windows 10 hidusb.sys fully reversed☆34Updated 7 years ago
- kernel exploitation helper class☆77Updated 8 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- Bootkits Revisited☆41Updated 11 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 10 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 9 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- OpenType font file format fuzzer for Windows☆52Updated 11 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Updated 10 years ago
- ☆28Updated 8 years ago
- Imports MSDN documentation into IDA Pro☆51Updated 13 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Updated 8 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆56Updated 8 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- ☆28Updated 3 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- Windows SMEP Bypass U=S☆37Updated 9 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 8 years ago
- BinCrowd Plugin for IDA Pro☆42Updated 13 years ago