Cr4sh / secretnet_explLinks
LPE exploits for Secret Net and Secret Net Studio
☆50Updated 9 years ago
Alternatives and similar repositories for secretnet_expl
Users that are interested in secretnet_expl are comparing it to the libraries listed below
Sorting:
- repository with additional materials and source code☆31Updated 8 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- ☆35Updated 9 years ago
- Diaphora, a Free and Open Source program diffing tool☆23Updated 5 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- Bootkits Revisited☆40Updated 11 years ago
- ☆32Updated last year
- Bypassing User Account Control (UAC) using TpmInit.exe☆42Updated 8 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆55Updated 9 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- ☆50Updated 8 years ago
- Tools for viewing and extracting HDD firmware files☆73Updated 10 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- kernel exploitation helper class☆77Updated 8 years ago
- hidusb.sys source code, Windows 10 hidusb.sys fully reversed☆34Updated 8 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆64Updated 10 years ago
- Demo bootloaders - created just for fun☆22Updated 7 years ago
- s(4)u for Windows☆48Updated 4 years ago
- ☆34Updated 7 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆50Updated 7 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago
- ☆28Updated 3 years ago
- Anti-AV compilation☆43Updated 11 years ago
- IDA PDB Loader☆47Updated 6 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32Updated 10 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- ☆28Updated 8 years ago