aaaddress1 / puzzCodeLinks
simple compiler based on mingw to build uncrackable windows application against analysis tools
☆63Updated 7 years ago
Alternatives and similar repositories for puzzCode
Users that are interested in puzzCode are comparing it to the libraries listed below
Sorting:
- tool for building windows shellcode in C by MinGW☆52Updated 3 years ago
- Windows x86 PE Packer In C++☆51Updated 5 years ago
- The Windows 10 LPE exploit written by SandboxEscaper☆109Updated 6 years ago
- Windows Injection 101: from Zero to ROP (HITCON 2017)☆28Updated 7 years ago
- PoC for DEF CON 26: Playing Malware Injection with Exploit thoughts☆25Updated 6 years ago
- DLL Injection Library & Tools☆71Updated 9 years ago
- Hollow Process / Dynamic Forking / RunPE injection technique implemented in Python☆53Updated 4 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆117Updated 8 years ago
- FLARE Kernel Shellcode Loader☆178Updated 6 years ago
- MediaTek Fuzzing Workshop in HITCON 2021☆63Updated 3 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- Process reimaging proof of concept code☆96Updated 6 years ago
- GUI Application in C# to run and disassemble shellcode☆35Updated 8 years ago
- Simple 32/64-bit PEs loader.☆138Updated 6 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆123Updated 4 years ago
- Run some secret code invisible from debugger single step.(x86 process on x64 windows only)☆25Updated 5 years ago
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆187Updated 3 years ago
- Malware Behavior Analyzer☆159Updated 8 years ago
- ☆80Updated 11 years ago
- Workshop material for a Windows Attack Surface Analysis Workshop☆67Updated 6 years ago
- POC for CVE-2018-0824☆87Updated 2 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 5 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆91Updated 6 years ago
- Malware Sandbox Emulation in Python @ HITCON 2018☆46Updated 7 years ago
- Local privilege escalation PoC exploit for CVE-2019-16098☆193Updated 5 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆49Updated 4 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆95Updated 6 years ago
- CVE-2019-9729. Transferred from https://github.com/DoubleLabyrinth/SdoKeyCrypt-sys-local-privilege-elevation☆84Updated 6 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- Anti-Debugging detection and obufuscation techniques that involved the use of Win32 API functions.☆34Updated 9 years ago