Malwareman007 / x64-DSA-Assembly
An x64 assembly implementation of essential data structures and algorithms for DSA.
☆13Updated last year
Alternatives and similar repositories for x64-DSA-Assembly:
Users that are interested in x64-DSA-Assembly are comparing it to the libraries listed below
- Movie Recommendation System based on machine learning concepts☆10Updated last year
- Lucifer is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python.☆19Updated 2 years ago
- Some basic info, resources, and code snippets about windows kernel exploitation☆10Updated 2 years ago
- ☆19Updated last year
- Personal notes☆10Updated 2 years ago
- 「💻」Simple kernel made in 16-bit assembly only☆15Updated 3 months ago
- 「🚪」The hidden hookless backdoor☆12Updated 3 months ago
- Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of oth…☆11Updated 2 years ago
- A collection of cybersecurity resources☆13Updated 2 weeks ago
- POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.☆17Updated 2 months ago
- A utility that can be used to launch an executable with a DLL injected☆18Updated last year
- www.rootkit.com users section mirror, sql database dump, and a few other files/rootkits.☆19Updated 9 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆15Updated last year
- Get started with writing your first ever Windows Driver☆30Updated last year
- TechViper is an advanced web security scanner designed to detect various vulnerabilities in web applications.☆15Updated 7 months ago
- MalDev & AV-EDR Evasion for Pentesters☆14Updated 2 years ago
- ExplorerUACStealer it's a malware that steal credentials provided by users in UAC Auth in explorer using API Hooking with Detours in C++…☆15Updated last year
- This repo for Windows x32-x64 Kernel/Driver/User Mode Exploitation writeups and exploits☆23Updated 10 months ago
- Collection of various WINAPI tricks / features used or abused by Malware☆14Updated 2 years ago
- ZTE F660 Routers Authentication Bypass Leading to RCE.☆16Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Nemo - An offensive Remote Access Tool & Post-Exploitation Framework (WIP).☆14Updated last year
- 「📖」Tool created to extract metadata from a domain☆13Updated 3 months ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆16Updated last year
- Persistence techniques for windows.☆19Updated last year
- ☆15Updated 10 months ago
- This is a simple process injection made in C for Linux systems☆26Updated last year
- 🐍 Python Exploit for CVE-2022-23935☆13Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆22Updated 4 months ago
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Updated 2 years ago