d0c-s4vage / narlyLinks
Automatically exported from code.google.com/p/narly
☆24Updated 4 years ago
Alternatives and similar repositories for narly
Users that are interested in narly are comparing it to the libraries listed below
Sorting:
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability☆23Updated 5 years ago
- ☆48Updated 5 years ago
- Flare-On solutions☆37Updated 5 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 7 years ago
- Control Flow Guard Teleportation demo☆23Updated 6 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- ☆53Updated 8 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 3 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 8 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 8 years ago
- ☆36Updated 5 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Updated 5 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- ☆50Updated 8 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- Public repository for HEVD exploits☆20Updated 7 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- ☆86Updated last year
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 6 years ago