Resources from my journey into Windows binary exploitation
☆24Jan 14, 2019Updated 7 years ago
Alternatives and similar repositories for Windows-Binary-Exploitation
Users that are interested in Windows-Binary-Exploitation are comparing it to the libraries listed below
Sorting:
- Program to leak anti-virus behaviour and such☆14Apr 18, 2019Updated 6 years ago
- Introductory software reverse engineering tutorial for beginners☆36Jun 2, 2019Updated 6 years ago
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆42May 6, 2020Updated 5 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆18Jan 15, 2022Updated 4 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Updated this week
- Exploit Exercises for Security Researchers (arm, x86...)☆13May 10, 2019Updated 6 years ago
- hypervisor in windows device driver by intel vt☆14Aug 25, 2018Updated 7 years ago
- Simple VM-based scripting language☆13Feb 25, 2020Updated 6 years ago
- Ready-to-use headers for Windows Kernel SSDT indices☆11Apr 12, 2020Updated 5 years ago
- Repository of different kernel drivers written while studying Windows NT Driver development☆12Apr 14, 2024Updated last year
- ☆16Jan 27, 2019Updated 7 years ago
- Protects deletion of files with a specified extension using a kernel-mode driver.☆76Jul 16, 2018Updated 7 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆18May 28, 2024Updated last year
- ☆14May 19, 2019Updated 6 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago
- Windows x64 Exploitation Training☆16May 30, 2025Updated 9 months ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆92Dec 6, 2018Updated 7 years ago
- Use NtSetInformationThread(ThreadBreakOnTermination) for anti-debugging☆15Sep 21, 2019Updated 6 years ago
- Windows Offline Crash Dump☆17Aug 29, 2022Updated 3 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- ☆34Aug 14, 2023Updated 2 years ago
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking☆17Apr 1, 2018Updated 7 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- x86_x64 emulator☆16Jun 23, 2015Updated 10 years ago
- Show all mapped memory in a process☆21Oct 27, 2023Updated 2 years ago
- Code injection via delay load libraries☆36Sep 20, 2017Updated 8 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆45May 10, 2021Updated 4 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- anti anti vm dll, used to hide VMWare characteristics as files, processes, services, registry values☆39Sep 3, 2018Updated 7 years ago
- POC of sysenter x64 LSTAR MSR hook☆41Jul 20, 2014Updated 11 years ago
- Windows KExec☆25Apr 20, 2010Updated 15 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Aug 23, 2019Updated 6 years ago
- Implement communication between c++ and javascript with IWebBrowser2☆21Jan 5, 2025Updated last year