daevlin / Zero2Auto_homeworkLinks
Data from analysis of the custom sample from the chapter "Practical Analysis and Test"
☆12Updated 4 years ago
Alternatives and similar repositories for Zero2Auto_homework
Users that are interested in Zero2Auto_homework are comparing it to the libraries listed below
Sorting:
- AMSI detection PoC☆31Updated 5 years ago
- ☆24Updated 3 years ago
- ☆16Updated 4 years ago
- Experiments on the Windows Internals☆30Updated 5 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆18Updated 7 years ago
- ☆15Updated 5 years ago
- ☆17Updated 4 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 5 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Updated 6 years ago
- ☆23Updated 4 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 5 years ago
- ☆28Updated 7 years ago
- A repository where I share my injection implemintations☆29Updated 4 years ago
- ☆45Updated 6 years ago
- Files for generating a C# source file that allows for memory-mapping "niceness" and then executing said "niceness"☆31Updated 6 years ago
- ☆21Updated 4 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆17Updated 5 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Updated 5 years ago
- C# code to run PIC using CreateThread☆17Updated 6 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆53Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆76Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Updated 3 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆15Updated 4 years ago
- Protect your servers with a secret header☆29Updated 4 years ago