My presentations from different conferences
☆15Sep 12, 2018Updated 7 years ago
Alternatives and similar repositories for Presentations
Users that are interested in Presentations are comparing it to the libraries listed below
Sorting:
- Writeups for ECSC 2019 National Phase☆10Jun 5, 2019Updated 6 years ago
- Malware monitor template based on MinHook☆17Mar 29, 2015Updated 10 years ago
- ☆11Sep 14, 2014Updated 11 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- Hidden module/dll detector for windows apps☆15May 21, 2017Updated 8 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆14Mar 4, 2017Updated 9 years ago
- obfuscate your c++ code with an external text file!☆10Nov 19, 2014Updated 11 years ago
- API Tracker by Cysinfo Team☆22Oct 12, 2016Updated 9 years ago
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 11 years ago
- ☆10Sep 29, 2019Updated 6 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆23May 31, 2017Updated 8 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- ☆14May 9, 2017Updated 8 years ago
- Script for generating write-ups templates for CTF challenges 🗃️☆15Feb 5, 2022Updated 4 years ago
- Position and velocity PID control of a DC motor using LabView and Arduino☆15Apr 23, 2018Updated 7 years ago
- Block process execute kernel driver for Windows x64☆19Apr 7, 2016Updated 9 years ago
- This is the python wrapper for The Security Framework SRDF☆49Apr 29, 2014Updated 11 years ago
- IDA2PAT_Reloaded for windows and mac osx☆13Sep 28, 2017Updated 8 years ago
- MIR-Engine☆23Jul 6, 2017Updated 8 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- C++03 compile-time ray tracer☆10Feb 22, 2018Updated 8 years ago
- ☆30May 23, 2017Updated 8 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Mar 13, 2017Updated 9 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Jun 18, 2018Updated 7 years ago
- Framework complet d'analyse de malware☆12Feb 22, 2016Updated 10 years ago
- Exported from https://code.google.com/archive/p/hookme/☆45Nov 24, 2016Updated 9 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 13 years ago
- Static Php Analysis and Fuzzer☆26Apr 22, 2014Updated 11 years ago
- eyuyan image rebuild tools source code☆13Sep 1, 2016Updated 9 years ago
- Qiling Advanced Binary Emulation framework☆12Aug 22, 2019Updated 6 years ago
- ExeScan is the FREE console based tool to detect anomalies in PE (Portable Executable) files. It quickly scans given executable file and …☆21Dec 14, 2018Updated 7 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 9 years ago
- ☆11Sep 23, 2017Updated 8 years ago
- Psinfo is a Volatility plugin which collects the process related information from the VAD (Virtual Address Descriptor) and PEB (Process E…☆39Sep 24, 2016Updated 9 years ago
- Windows handle stealing POC with NtDuplicateObject☆41May 7, 2017Updated 8 years ago
- Windows Vpn Scripter☆14Dec 7, 2016Updated 9 years ago
- Some simple and useful tools☆15May 8, 2018Updated 7 years ago