Satharus / AES-EncryptionLinks
AES Encryption using x86 Assembly (NASM)
☆13Updated 5 years ago
Alternatives and similar repositories for AES-Encryption
Users that are interested in AES-Encryption are comparing it to the libraries listed below
Sorting:
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆126Updated 2 years ago
- A comprehensive Hypervisor resources repo☆169Updated last week
- Reverse text segment x64 ELF infector written in Assembly☆20Updated 4 years ago
- Dreg's setup for lldb reversing. The simplest and easiest possible, without scripting. lldb debugging setup.☆14Updated last year
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- Collection of codes focused on Linux rootkits☆177Updated 3 weeks ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆32Updated 5 years ago
- Some of my windows kernel exploits for learning purposes☆131Updated 3 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- An ELF / PE binary packer written in pure C, made for fun☆98Updated last year
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆160Updated 3 years ago
- Recon 2023 slides and code☆80Updated 2 years ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆84Updated 7 months ago
- Learning FreeBSD Kernel Hacking - Exercises☆42Updated 5 years ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆261Updated 2 years ago
- Exploitable drivers, you know what I mean☆153Updated 3 weeks ago
- uefi diskless persistence technique + OVMF secureboot bypass☆93Updated last year
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆227Updated 2 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆130Updated 4 years ago
- yet another hidden LKM hunter☆29Updated last month
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆127Updated 6 months ago
- source code for the examples and topics from the book☆10Updated 6 years ago
- ☆13Updated 6 months ago
- SMM rootkit similar to LoJax or MosaicRegressor☆138Updated last year
- ☆53Updated 6 years ago
- Linux process injection PoCs☆30Updated last year
- [ARCHIVED] Early work on Abyss (Windows UEFI Bootkit).☆44Updated 2 months ago
- I/O Cache-As-Ram + AMD x86_64 cache line locking | Mirror of https://codeberg.org/3itch/icekit☆19Updated 7 months ago
- ☆74Updated last year