demon-i386 / jakshoo
LD_PRELOAD rootkit
☆5Updated 2 years ago
Alternatives and similar repositories for jakshoo
Users that are interested in jakshoo are comparing it to the libraries listed below
Sorting:
- A collections of methods to sleep on Windows using common and less-so-common techniques☆14Updated 9 months ago
- Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)☆8Updated 3 years ago
- Tool to start a python http server in a simple way☆10Updated 3 years ago
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Updated last year
- PoC for the CVE-2021-4034 vulnerability, affecting polkit < 0.120.☆24Updated 3 years ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆115Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆109Updated 8 months ago
- RISC-V Virtual Machine☆216Updated 2 months ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆41Updated last year
- Binary Golf Grand Prix☆56Updated 2 months ago
- Abusing exceptions for code execution.☆111Updated 2 years ago
- A journal for $6,000 Riot Vanguard bounty.☆63Updated last year
- ☆38Updated last year
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆48Updated 11 months ago
- A command line Windows API tracing tool for Golang binaries.☆156Updated last year
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆123Updated last year
- Analysis of the vulnerability☆51Updated last year
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆78Updated 2 months ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆13Updated 2 years ago
- ☆73Updated 2 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 2 months ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆66Updated 2 months ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆127Updated last year
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆285Updated last year
- Ghidra scripts for recovering string definitions in Go binaries☆111Updated 6 months ago
- ☆126Updated last week
- Slides for COM Hijacking AV/EDR Talk on 38c3☆73Updated 4 months ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- Splitting and executing shellcode across multiple pages☆103Updated last year
- How to retro theme your Ghidra☆35Updated 6 months ago