MaxXor / keygenme-v7Links
Source code of my KeygenMe V7 challenge
☆22Updated 7 years ago
Alternatives and similar repositories for keygenme-v7
Users that are interested in keygenme-v7 are comparing it to the libraries listed below
Sorting:
- ☆46Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 9 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- ☆34Updated 8 years ago
- Code injection via delay load libraries☆36Updated 8 years ago
- DLL Injection Library & Tools☆73Updated 9 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Updated 7 years ago
- https://blog.xpnsec.com/windows-warbird-privesc/☆31Updated 8 years ago
- Application Security library☆11Updated 13 years ago
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- The exploit for Panda AV LPE☆37Updated 6 years ago
- Miscellanous scripts used for malware analysis☆23Updated 7 years ago
- ☆36Updated 6 years ago
- A session-0 capable dll injection utility☆76Updated 7 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 10 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- CAPE monitor DLLs☆41Updated 6 years ago
- x86_64 linux rootkit using debug registers☆53Updated 3 years ago
- A minimal tool to extract shellcode from 64-bit PE binaries.☆51Updated 4 years ago
- My manual analysis of malware families☆13Updated 8 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Updated 7 years ago
- My Shellcode Archive☆29Updated 8 years ago
- Windows Console Monitoring☆103Updated 8 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆23Updated 7 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- public bugs/proof of concepts☆50Updated 4 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆29Updated 7 years ago
- ☆54Updated 8 years ago