bysideen / eBook-1Links
☆64Updated 6 years ago
Alternatives and similar repositories for eBook-1
Users that are interested in eBook-1 are comparing it to the libraries listed below
Sorting:
- Solutions to some crackmes that I have done.☆71Updated 3 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆84Updated 8 years ago
- ☆118Updated 5 years ago
- Files for the packer tutorial☆75Updated 4 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆161Updated 3 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- May the POC be with you☆63Updated last month
- How to write a CrackMe for a CTF competition. Source code, technical explanation, anti-debugging and anti reverse-engineering tricks.☆49Updated 2 years ago
- x86 and x64 assembly "read-eval-print loop" for Windows☆33Updated 8 years ago
- A simple Windows kernel rootkit.☆94Updated 6 months ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆233Updated 2 years ago
- WinREPL is a "read-eval-print loop" shell on Windows that is useful for testing/learning x86 and x64 assembly.☆17Updated 3 years ago
- ☆77Updated 8 years ago
- Simple x86 Trampoline Hook☆43Updated 3 years ago
- Simple API Hooks detector☆75Updated 3 years ago
- Windows Kernel Programming (Обзорный перевод книги)☆58Updated 4 years ago
- a dkom rootkit that targets windows x64 systems. the rootkit hooks and edits criticl memory sections in order to hide different resources…☆18Updated 2 years ago
- My notes while studying Windows exploitation☆191Updated 2 years ago
- windows rootkit☆59Updated last year
- Exploitable drivers, you know what I mean☆154Updated 2 weeks ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- ☆90Updated 5 years ago
- Compact MBR Bootkit for Windows☆54Updated 3 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆74Updated 3 years ago
- Helper script for Windows kernel debugging with IDA Pro on native Bochs debugger (including PDB symbols)☆61Updated 2 years ago
- 2022 Updated Kernelmode-Code☆33Updated last year
- https://0xrick.github.io/win-internals/pe8/☆50Updated 4 years ago
- Add an empty section to a PE file☆53Updated 8 years ago
- Some of my windows kernel exploits for learning purposes☆134Updated 3 years ago
- Initiative to collect and preserve crackmes for learning and practice in reverse engineering☆114Updated 4 years ago