buzzer-re / ShinigamiLinks
A dynamic unpacking tool
☆142Updated 2 years ago
Alternatives and similar repositories for Shinigami
Users that are interested in Shinigami are comparing it to the libraries listed below
Sorting:
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆120Updated last year
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆146Updated last year
- x86/x64 Ring 0/-2 System Freezer/Debugger☆120Updated 5 months ago
- Windows x64 kernel mode rootkit process hollowing POC.☆188Updated 2 years ago
- Exploitable drivers, you know what I mean☆153Updated last month
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆64Updated last year
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆126Updated 2 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆217Updated 2 years ago
- ☆114Updated 3 months ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆36Updated 2 years ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆107Updated 8 months ago
- A journal for $6,000 Riot Vanguard bounty.☆65Updated 2 years ago
- Recon 2023 slides and code☆80Updated 2 years ago
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆47Updated last year
- MalUnpack companion driver☆97Updated last year
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆118Updated 2 years ago
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆235Updated last year
- Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls☆188Updated 2 months ago
- ☆72Updated 2 years ago
- Rewrite and obfuscate code in compiled binaries☆261Updated last week
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆165Updated last year
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆35Updated last year
- Report and exploit of CVE-2023-36427☆88Updated last year
- A Python script to download PDB files associated with a Portable Executable (PE)☆125Updated 8 months ago
- An x64dbg plugin which helps make sense of long C++ symbols☆57Updated 2 years ago
- Admin to Kernel code execution using the KSecDD driver☆258Updated last year
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆241Updated 2 years ago
- OFFZONE 2024 Malware Persistence workshop☆21Updated 10 months ago
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆126Updated 2 years ago
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆162Updated 2 years ago