DeliciousHorse / writeups
☆21Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for writeups
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 6 years ago
- ☆22Updated 7 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 6 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆44Updated 6 years ago
- API Tracker by Cysinfo Team☆22Updated 8 years ago
- ☆51Updated 7 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆36Updated 7 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 5 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 7 years ago
- QEMU with rVMI extensions☆25Updated 7 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆40Updated 10 years ago
- Break Apps with Frida workshop material☆43Updated 7 years ago
- fragments of dirty, and quick code. possible error checking or none.☆25Updated 7 years ago
- ☆33Updated 9 years ago
- ☆39Updated 3 years ago
- ☆36Updated 5 years ago
- Material from our CANAPE workshop☆32Updated 5 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 7 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago
- ☆32Updated 7 years ago
- Analysis PE file or Shellcode☆48Updated 8 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆30Updated 7 years ago
- ☆11Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- API functions for Malware Research☆35Updated 5 years ago