SentinelOne's KeRnel Exploits Advanced Mitigations
☆54Nov 1, 2018Updated 7 years ago
Alternatives and similar repositories for SKREAM
Users that are interested in SKREAM are comparing it to the libraries listed below
Sorting:
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- GoLismero web fingerprint population tool☆19Jul 30, 2013Updated 12 years ago
- ☆10Apr 11, 2023Updated 2 years ago
- ☆13Jun 20, 2022Updated 3 years ago
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- some tlb experimentation code: calculate L1, L2 miss penalties and show cross-HT interference.☆15Aug 30, 2019Updated 6 years ago
- ☆16Dec 14, 2017Updated 8 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆77Sep 23, 2022Updated 3 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆36Feb 28, 2020Updated 6 years ago
- IoT device scanner.☆41Aug 19, 2019Updated 6 years ago
- ☆35Jul 20, 2021Updated 4 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 8 years ago
- A WebExtension for users of synchronized reading lists to add a Wikimedia wiki page from the browser.☆16Apr 23, 2020Updated 5 years ago
- Universal LAN-based SSRF Attack Primitive☆19Aug 10, 2019Updated 6 years ago
- My articles for Paged Out! #2☆17Nov 20, 2019Updated 6 years ago
- A common set of helpers used across VTIL toolchain. Moved into -->☆21May 2, 2020Updated 5 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆20Sep 4, 2018Updated 7 years ago
- How fast can we brute force a 64-bit comparison?☆54Dec 19, 2019Updated 6 years ago
- The Windows Library for Intel Process Trace (WinIPT) is a project that leverages the new Intel Processor Trace functionality exposed by W…☆406Apr 27, 2023Updated 2 years ago
- PoC code using debugfs to store files in memory and execute them☆27May 25, 2018Updated 7 years ago
- Brand New Code Injection for Windows https://breakingmalware.com/injection-techniques/atombombing-brand-new-code-injection-for-windows☆18Oct 29, 2016Updated 9 years ago
- hook msr by amd svm☆125Dec 30, 2019Updated 6 years ago
- ☆46Aug 21, 2019Updated 6 years ago
- A simple example application to collect DNS queries logs using etw-api☆27May 11, 2020Updated 5 years ago
- A copy of my Mathematics and Computer Engineering B.Sc. thesis☆20Dec 8, 2020Updated 5 years ago
- This is a shared native SQLite library used for Couchbase Lite Android/Java.☆20Jun 8, 2020Updated 5 years ago
- Experiments involving the Windows Hypervisor Platform☆23Jun 24, 2020Updated 5 years ago
- python inspect rootkit tool☆33Oct 17, 2013Updated 12 years ago
- exploit development☆49Mar 14, 2018Updated 7 years ago
- use afl to fuzz swift program☆24Nov 3, 2017Updated 8 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- The toolchain of Chosen-instruction attack☆21May 3, 2022Updated 3 years ago
- The grey fox☆25Jun 22, 2016Updated 9 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- x86-64 virtual machine and disassembler☆147Nov 23, 2019Updated 6 years ago
- Symbolic expression simplifier used across VTIL toolchain. Moved into -->☆25May 2, 2020Updated 5 years ago
- windows-kernel-exploits Windows平台提权漏洞集合☆23Jul 29, 2021Updated 4 years ago
- REmatch, a complete binary diffing framework that is free and strives to be open source and community driven.☆155Nov 29, 2018Updated 7 years ago