ThisIsSecurity / sinkhole
Miscellanous scripts used for malware analysis
☆22Updated 6 years ago
Alternatives and similar repositories for sinkhole:
Users that are interested in sinkhole are comparing it to the libraries listed below
- ☆51Updated 8 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago
- Flare-On solutions☆36Updated 5 years ago
- Automated library compilation and PDB annotation with CMake and IDA Pro☆20Updated 6 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 7 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- ☆26Updated 10 years ago
- ☆44Updated 6 years ago
- ☆43Updated 6 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆31Updated 9 years ago
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 8 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago
- ☆22Updated 7 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 6 years ago
- My conference presentations and publications☆26Updated 3 years ago
- ☆32Updated 8 months ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Updated 10 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 6 years ago
- ☆45Updated 6 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- ☆21Updated 5 years ago
- A python script that can be used to scan data within in an IDB using Yara.☆22Updated 6 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆31Updated 8 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- Public repository for HEVD exploits☆20Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago