Work files for my blog post "Code Caving in a PE file.
☆16Dec 18, 2016Updated 9 years ago
Alternatives and similar repositories for PE-CodeCaving
Users that are interested in PE-CodeCaving are comparing it to the libraries listed below
Sorting:
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- hook: linux kernel syscall hijack☆21Dec 28, 2016Updated 9 years ago
- A command-line tool to filter text and highlight the output.☆21Aug 27, 2019Updated 6 years ago
- ExeScan is the FREE console based tool to detect anomalies in PE (Portable Executable) files. It quickly scans given executable file and …☆21Dec 14, 2018Updated 7 years ago
- Small C application designed to detect LD_PRELOAD malware via the libdl library functions.☆56May 23, 2016Updated 9 years ago
- Kernel heap pointer disclosure in IOGraphicsFamily.☆13Aug 19, 2017Updated 8 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Mar 22, 2017Updated 8 years ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆12Jun 12, 2019Updated 6 years ago
- Yara syntax highlighting☆25Sep 4, 2021Updated 4 years ago
- collection of helper tools for fuzzing☆17Oct 3, 2023Updated 2 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- How to install a PCE simplified.☆17Jan 11, 2026Updated 2 months ago
- Packer for PE and ELF, 32 and 64bits.☆22Aug 5, 2013Updated 12 years ago
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentation…☆20Sep 18, 2017Updated 8 years ago
- Dynamic COFF object loader☆23Jun 29, 2018Updated 7 years ago
- ☆35Sep 18, 2015Updated 10 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- Various dll hollowing techniques☆10Feb 29, 2024Updated 2 years ago
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…☆16Oct 31, 2019Updated 6 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- ☆11Jul 29, 2025Updated 7 months ago
- Various Write Ups from OverTheWire, TryHackMe, HackTheBox, CrackMes.one and more!☆11Dec 25, 2022Updated 3 years ago
- Shellcode异或加密工具☆12Mar 23, 2017Updated 8 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆15Feb 16, 2021Updated 5 years ago
- Expired FUD .exe crypter☆12Aug 21, 2016Updated 9 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- ☆24Feb 21, 2016Updated 10 years ago
- The Horrific Omnipotent Rootkit☆23Mar 17, 2017Updated 9 years ago
- Codecave miner☆14Dec 21, 2022Updated 3 years ago
- Geppetto - Virtual machine and infrastructure orchestration☆14Feb 13, 2025Updated last year
- Fetch PDB symbols directly from Microsoft's symbol servers☆48Oct 22, 2025Updated 4 months ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Oct 3, 2017Updated 8 years ago
- 🏦 Finance utility for Bitstamp☆14Sep 10, 2017Updated 8 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year