KaiBelmo / xchg-rax-rax
Solutions of xchg rax,rax
☆15Updated 4 years ago
Alternatives and similar repositories for xchg-rax-rax:
Users that are interested in xchg-rax-rax are comparing it to the libraries listed below
- ☆14Updated last year
- some of my IOCs from malware investigations☆10Updated 2 years ago
- The Hack3r News B'darija☆18Updated 2 years ago
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆17Updated 3 years ago
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆20Updated 2 years ago
- a collection of elf file infectors☆27Updated 3 years ago
- x86 Trampoline Hook☆40Updated 2 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆19Updated 2 years ago
- TightVNC Vulnerability.☆16Updated 3 years ago
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆27Updated last year
- Bypass Malware Time Delays☆100Updated 2 years ago
- CVE's we discovered along the way☆16Updated 3 years ago
- Open Redirect scanner☆18Updated 2 years ago
- POC of a better implementation of GetProcAddress for ntdll using binary search☆94Updated 9 months ago
- CVE-2023-38831 winrar exploit generator and get reverse shell☆11Updated last year
- ☆33Updated 2 years ago
- Network Shredder IDS☆11Updated 5 months ago
- ☆44Updated 3 years ago
- Osint French People Location☆15Updated 2 years ago
- DC540 hacking challenge 0x00001.☆26Updated last year
- IAT Unhooking proof-of-concept☆29Updated 9 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is…☆29Updated 2 years ago
- CATANA - CUT your Wordlist!☆13Updated 2 years ago
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆30Updated last year
- Small Archive of leaked materials that i found interesting and that can be used for Research and analysis purposes (Malwares, Leaks & Lin…☆2Updated 4 years ago
- a reliable C based exploit and writeup for CVE-2021-3560.☆37Updated 3 years ago
- A tool that encrypt and hide your data inside your images.☆30Updated 3 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆28Updated 2 years ago
- CSharp4Pentesters☆12Updated 2 years ago