DoctorEww / FontuscatorLinks
A way to use fonts to obfuscate text.
☆48Updated 2 years ago
Alternatives and similar repositories for Fontuscator
Users that are interested in Fontuscator are comparing it to the libraries listed below
Sorting:
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆65Updated 2 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆16Updated 10 months ago
- Encrypt your git repo...☆50Updated 3 years ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 9 months ago
- ☆18Updated 10 months ago
- ☆33Updated 2 years ago
- x86_64 LKM linux rootkit☆16Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- Golang bindings for PE-sieve☆42Updated 2 years ago
- CVE-2018-6066 using VBA☆67Updated 3 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Updated 3 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 3 years ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆37Updated 2 months ago
- ☆48Updated 2 years ago
- x64 Windows package of the shellcode2exe tool☆14Updated 4 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 5 years ago
- PAM Backdoor☆32Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Proof of Concept example for abusing Process Hacker 2 (v2.39.124)☆25Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆28Updated 7 months ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11Updated 3 years ago
- Progress of learning kernel development☆14Updated 3 years ago
- A utility that can be used to launch an executable with a DLL injected☆19Updated 2 years ago
- ☆57Updated 3 years ago