Necrosys / zerowine-tryout
Zero Wine Tryouts: An open source malware analysis tool
☆16Updated 8 years ago
Alternatives and similar repositories for zerowine-tryout:
Users that are interested in zerowine-tryout are comparing it to the libraries listed below
- ☆24Updated 5 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆29Updated 7 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 5 years ago
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- A collection of anti disassembly techniques☆18Updated 7 years ago
- Rekall Memory Forensic Framework☆30Updated 5 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆9Updated 8 years ago
- 🐧 A simple kernel-level rootkit☆20Updated 8 years ago
- ☆22Updated 3 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 6 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 7 years ago
- Zerokit shared code☆16Updated 5 years ago
- ☆26Updated 3 months ago
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 6 years ago
- ☆28Updated 7 years ago
- ☆33Updated 3 years ago
- My solutions for random crackmes and other challenges☆11Updated 5 years ago
- If you want to exploit some kernel overflows, I've designed (long time ago) several levels ; have fun!☆8Updated 12 years ago
- it's a simple LKM rootkit.☆12Updated 8 years ago
- Code injection via delay load libraries☆34Updated 7 years ago
- My conference presentations and publications☆26Updated 2 years ago
- Library for Windows XML Event Log (EVTX) data types☆17Updated 4 months ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 4 years ago
- ☆13Updated 7 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 7 years ago
- simple rootkit for computer security class☆14Updated 12 years ago