Linux kernel internals' notes
☆20Feb 12, 2026Updated last month
Alternatives and similar repositories for linux-kernel
Users that are interested in linux-kernel are comparing it to the libraries listed below
Sorting:
- My notes while studying Windows exploitation☆193Jul 25, 2023Updated 2 years ago
- My notes while studying Windows internals☆447Dec 9, 2024Updated last year
- Intel / AMD CPU Internals☆1,180Mar 7, 2021Updated 5 years ago
- Experimental imgui app framework for rapid prototyping.☆14Aug 10, 2025Updated 7 months ago
- A collection of Vulnerable Windows Drivers☆16Dec 4, 2021Updated 4 years ago
- Reverse Engineering challenges☆37Dec 23, 2020Updated 5 years ago
- Plugin for NOPing instructions in IDA☆21May 9, 2024Updated last year
- A MBR Fuzzer☆31Apr 3, 2024Updated last year
- Reads and prints information from the website MalAPI.io☆20Jul 14, 2022Updated 3 years ago
- Helper script for Linux kernel disassemble or debugging with IDA Pro on VMware + GDB stub (including some symbols helpers)☆38Aug 11, 2023Updated 2 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Parses and symbolizes MSVC RTTI information in Binary Ninja.☆28Nov 19, 2024Updated last year
- Yet another Windows DLL injector.☆40Nov 17, 2021Updated 4 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Jun 5, 2022Updated 3 years ago
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆114Aug 31, 2024Updated last year
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Aug 31, 2022Updated 3 years ago
- Writeups for HITCON CTF 2020☆10Nov 29, 2020Updated 5 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- Converts a 3DS program's EXEFS to an (IDA-loadable) ELF☆12Apr 13, 2017Updated 8 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Red-Teaming TempleOS.☆17Jul 29, 2022Updated 3 years ago
- Released presentations of my talks + code that used during these talks☆15Sep 5, 2024Updated last year
- A curated list of browser fuzzing researches, papers, tools, ...☆14Jan 30, 2023Updated 3 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆22Jul 30, 2022Updated 3 years ago
- IDA Python scripts☆42Apr 11, 2025Updated 11 months ago
- Polymorphic ELF Virus☆18Mar 19, 2022Updated 4 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- A domain/ip fuzzing tool for vulnerability mining☆13Jan 2, 2015Updated 11 years ago
- Zero Wine Tryouts: An open source malware analysis tool☆17Jun 7, 2016Updated 9 years ago
- Basic USB passthrough from a host PC to a Beaglebone Black (or any device capable of using GadgetFs)☆17Oct 9, 2016Updated 9 years ago
- A dynamic confuserex unpacker that relies on invoke for most things☆43Mar 15, 2020Updated 6 years ago
- Python substitute and transposition ciphers including Vigenère Cipher, Rail Fence Cipher, Caesar Cipher☆10Jul 16, 2021Updated 4 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆16Mar 20, 2025Updated last year
- WinREPL is a "read-eval-print loop" shell on Windows that is useful for testing/learning x86 and x64 assembly.☆17Aug 19, 2022Updated 3 years ago
- cross platform library to manipulate and extract information of memory regions☆34Apr 10, 2018Updated 7 years ago
- 免杀木马样本☆105Oct 11, 2025Updated 5 months ago
- Various scripts & tools☆12Apr 22, 2024Updated last year
- ☆16Sep 5, 2024Updated last year
- a repo for utilizing a base64 like encoding scheme + AES Encryption using Emojis☆13Mar 16, 2025Updated last year