Data from analysis of the custom sample from the chapter "Practical Analysis and Test"
☆12Aug 1, 2020Updated 5 years ago
Alternatives and similar repositories for Zero2Auto_homework
Users that are interested in Zero2Auto_homework are comparing it to the libraries listed below
Sorting:
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- ps-like .NET Assembly for enumerating processes on the current machine or a remote machine.☆13Aug 12, 2019Updated 6 years ago
- ☆29May 10, 2020Updated 5 years ago
- ☆53Nov 11, 2021Updated 4 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- Random Code Snippets☆30May 24, 2019Updated 6 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Mar 2, 2021Updated 4 years ago
- Kernel Cache Decryption for iOS☆17Nov 16, 2021Updated 4 years ago
- Miscellaneous scripts and tools☆15Oct 17, 2019Updated 6 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- .Net PlugIn For x64dbg☆20Feb 27, 2018Updated 8 years ago
- A Crude C2 to Demonstrate Using QR Codes for Channel Traffic☆39Sep 21, 2020Updated 5 years ago
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆17Jan 7, 2017Updated 9 years ago
- API Tracker by Cysinfo Team☆22Oct 12, 2016Updated 9 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Jul 11, 2021Updated 4 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- ☆23May 28, 2021Updated 4 years ago
- Execute commands and get exit status and stdout☆18Feb 16, 2022Updated 4 years ago
- ☆24Aug 4, 2020Updated 5 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆59Apr 1, 2022Updated 3 years ago
- all credits go to @mgeeky☆65Oct 14, 2021Updated 4 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Apr 13, 2018Updated 7 years ago
- A ping detection tool for linux☆24Apr 20, 2020Updated 5 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Aug 12, 2018Updated 7 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Jan 8, 2022Updated 4 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- ☆28Oct 4, 2021Updated 4 years ago
- We can Use this tool to find out sensitive data such as API keys, hardcoded credentials etc.☆24Dec 18, 2021Updated 4 years ago
- HadesMem is a C++-based memory hacking library for Windows based applications, with the goal of providing a safe, generic, powerful, and …☆28Jan 7, 2015Updated 11 years ago
- c# reverse shell poc☆26Dec 22, 2025Updated 2 months ago
- Execute .Net assemblies using Rundll32.exe☆115Mar 17, 2021Updated 4 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 2 years ago
- Various scripts for different malware families☆106Apr 12, 2021Updated 4 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Sep 10, 2013Updated 12 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago