cyberark / ByteCodeLLM
☆41Updated 5 months ago
Alternatives and similar repositories for ByteCodeLLM
Users that are interested in ByteCodeLLM are comparing it to the libraries listed below
Sorting:
- A few examples of how to trap virtual memory access on Windows.☆30Updated 5 months ago
- ☆33Updated last year
- Plugin interface for remote communications with Binary Ninja database and MCP server for interfacing with LLMs.☆32Updated 2 weeks ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆28Updated 3 weeks ago
- A simple but useful project maybe help you reverse Windows.☆38Updated last year
- ☆20Updated 4 months ago
- Remove WPP calls from hexrays decompiled code☆48Updated last month
- This master thesis project continuously collects and analyses Microsoft Windows kernel drivers using static and dynamic methods to help s…☆19Updated 6 months ago
- ☆30Updated 2 months ago
- Report and exploit of CVE-2023-36427☆90Updated last year
- ☆30Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated 11 months ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆76Updated 2 weeks ago
- ☆34Updated 11 months ago
- LPE exploit for CVE-2023-36802☆22Updated last year
- ☆46Updated last month
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆41Updated 4 months ago
- Rule Engine for Dynamic Malware Analysis and Research☆23Updated last month
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆54Updated this week
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆34Updated last year
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆19Updated last year
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆40Updated 6 months ago
- Repo with different exploits & PoCs☆64Updated this week
- ☆52Updated 7 months ago
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆36Updated 4 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆73Updated 4 months ago
- ☆38Updated 3 months ago
- Analysis of the vulnerability☆51Updated last year
- Finding Truth in the Shadows☆92Updated 2 years ago
- poc code for CVE-2024-38080☆30Updated 8 months ago