KaiBelmo / xchg-rax-rax
Solutions of xchg rax,rax
☆15Updated 4 years ago
Alternatives and similar repositories for xchg-rax-rax
Users that are interested in xchg-rax-rax are comparing it to the libraries listed below
Sorting:
- Bypass Malware Time Delays☆101Updated 2 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆20Updated 2 years ago
- ☆14Updated last year
- Network Shredder IDS☆11Updated 9 months ago
- CVE-2023-38831 winrar exploit generator and get reverse shell☆11Updated last year
- a collection of elf file infectors☆27Updated 3 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- ☆10Updated 2 years ago
- ☆33Updated 2 years ago
- ☆12Updated 4 years ago
- Get started with writing your first ever Windows Driver☆33Updated last year
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆17Updated 3 years ago
- ☆16Updated last week
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆40Updated 9 months ago
- CSharp4Pentesters☆12Updated 3 years ago
- Simple x86 Trampoline Hook☆40Updated 2 years ago
- Some basic info, resources, and code snippets about windows kernel exploitation☆10Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆85Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- The Hack3r News B'darija☆18Updated 2 years ago
- POC of a better implementation of GetProcAddress for ntdll using binary search☆109Updated last year
- TightVNC Vulnerability.☆16Updated 3 years ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆29Updated 2 years ago
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆20Updated 3 years ago
- IAT Unhooking proof-of-concept☆29Updated last year
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆27Updated 4 years ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆18Updated 5 months ago
- CVE's we discovered along the way☆17Updated 3 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Updated 3 years ago
- x86_64 LKM linux rootkit☆16Updated last year