ambray / RE-CourseLinks
☆24Updated 8 years ago
Alternatives and similar repositories for RE-Course
Users that are interested in RE-Course are comparing it to the libraries listed below
Sorting:
- ☆25Updated 6 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆38Updated 9 years ago
- ☆52Updated 8 years ago
- Reflective Polymorphism☆104Updated 7 years ago
- public bugs/proof of concepts☆49Updated 4 years ago
- DLL Injection Library & Tools☆71Updated 9 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 10 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆55Updated 8 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- UAC 0Day all day!☆57Updated 7 years ago
- Tools to enumerate Windows Firewall Hook Drivers on Windows 2000, XP and 2003☆20Updated 10 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- API Tracker by Cysinfo Team☆22Updated 8 years ago
- Experimental Windows .text section Patch Detector☆21Updated 10 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆50Updated 7 years ago
- Public repository for HEVD exploits☆20Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- fragments of dirty, and quick code. possible error checking or none.☆24Updated 8 years ago
- Flare-On solutions☆36Updated 5 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆43Updated 8 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- A Generic Windows Memory Scraping Tool☆71Updated 8 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- ☆22Updated 8 years ago
- Ring3 Rootkit Backdoor.☆42Updated 10 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Updated 8 years ago
- ☆13Updated 8 years ago