☆19Aug 22, 2023Updated 2 years ago
Alternatives and similar repositories for ezines
Users that are interested in ezines are comparing it to the libraries listed below
Sorting:
- WinDbg plugin to trace module transitions from a debugged driver.☆44Dec 22, 2025Updated 2 months ago
- ☆57Jan 15, 2024Updated 2 years ago
- Blog/Journal on how to backdoor VSCode extensions☆77Feb 24, 2026Updated last week
- Native opaque predicate cleaner plugin for Binary Ninja☆46Updated this week
- My fuzzing workshop from PHDays9☆26May 24, 2019Updated 6 years ago
- ☆59Feb 19, 2026Updated 2 weeks ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Nov 18, 2020Updated 5 years ago
- iTLB multihit PoC☆42Nov 4, 2023Updated 2 years ago
- Payload Obfuscation for Red Teams workshop materials☆81Nov 25, 2025Updated 3 months ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆44Oct 11, 2025Updated 4 months ago
- Ready-made Windows Sandbox launch profiles and scripts that automate the routine☆18Feb 1, 2023Updated 3 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 6 months ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 10 months ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- Plugin interface for remote communications with Binary Ninja database and MCP server for interfacing with LLMs.☆59Feb 21, 2026Updated 2 weeks ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Sep 16, 2017Updated 8 years ago
- ☆45Jan 1, 2023Updated 3 years ago
- ☆164Jun 12, 2025Updated 8 months ago
- ☆12Jul 27, 2017Updated 8 years ago
- Slurm Examples☆10Aug 30, 2024Updated last year
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- A proof of concept reverse shell in Rust for Windows and Linux.☆12Jul 6, 2021Updated 4 years ago
- Various CTF challenge solutions☆12Apr 20, 2021Updated 4 years ago
- A Rust library along with a Win32 GUI application to determine the driver load order of a Windows system (cf. https://colinfinck.de/posts…☆12Jan 26, 2025Updated last year
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 3 months ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- AFL++(2.63c/2.65c) + aflsmart(5ad7ea3)☆11Oct 20, 2020Updated 5 years ago
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- Aggressor Notification Scripts for cobaltstrike via slack & discord☆14Nov 27, 2025Updated 3 months ago
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- ☆11Sep 26, 2019Updated 6 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- MouHidInputHook enables users to filter, modify, and inject mouse input data packets into the input data stream of HID USB mouse devices …☆11Jul 11, 2019Updated 6 years ago
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 9 months ago
- Multilayered secret detection tool☆41Feb 11, 2026Updated 3 weeks ago