Fmk0 / workLinks
Links or additional data to some researches
☆14Updated 6 years ago
Alternatives and similar repositories for work
Users that are interested in work are comparing it to the libraries listed below
Sorting:
- ☆36Updated 5 years ago
- ☆43Updated 6 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- A Simple PE File Heuristics Scanners☆51Updated 6 years ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆21Updated 7 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 5 years ago
- ☆45Updated 7 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆42Updated 7 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22Updated 6 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆14Updated 6 years ago
- Windows 10 Exploit☆30Updated 6 years ago
- ☆23Updated 5 years ago
- Synaptics Audio Driver LPE☆37Updated 6 years ago
- My Shellcode Archive☆28Updated 8 years ago
- ☆15Updated 4 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- Fuzzing Framework☆10Updated 7 years ago
- PoC for CVE-2020-1015☆39Updated 5 years ago
- Work in Progress repo☆14Updated 6 years ago
- ☆14Updated 6 years ago
- ☆13Updated 5 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 8 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆14Updated 5 years ago
- GUI Application in C# to run and disassemble shellcode☆35Updated 8 years ago
- ☆16Updated 5 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 6 years ago
- ☆13Updated 8 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- ☆46Updated 6 years ago