DeliciousHorse / writeups
☆21Updated 6 years ago
Alternatives and similar repositories for writeups:
Users that are interested in writeups are comparing it to the libraries listed below
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- ☆22Updated 7 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- API Tracker by Cysinfo Team☆22Updated 8 years ago
- ☆34Updated 7 years ago
- ☆34Updated 9 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆40Updated 11 years ago
- PyCommand Scripts for Immunity Debugger☆36Updated 10 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- ☆39Updated 4 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- ☆42Updated 6 years ago
- ☆51Updated 8 years ago
- ☆33Updated 8 years ago
- ☆43Updated 6 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆31Updated 8 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- ASERT shared scripts for reversing☆32Updated 7 years ago
- Flare-On solutions☆36Updated 5 years ago
- API functions for Malware Research☆35Updated 5 years ago
- UAC 0Day all day!☆58Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 6 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 6 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 7 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆31Updated 9 years ago