deresz / avwhy
A script to reverse-engineer anti-virus signatures
☆32Updated 11 years ago
Related projects: ⓘ
- Bootkits Revisited☆41Updated 10 years ago
- Demo bootloaders - created just for fun☆21Updated 7 years ago
- POC for IAT Parsing Payloads☆46Updated 7 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆36Updated 7 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 9 years ago
- ☆10Updated 2 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆20Updated 9 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 8 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- ☆41Updated 6 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 11 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Updated 12 years ago
- Malware.lu configuration extractor☆24Updated 10 years ago
- ☆27Updated 2 years ago
- ☆32Updated 3 months ago
- Anti-technique Codes, Detection of Anti-technique codes☆36Updated 10 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 8 years ago
- Test suite for bypassing Malware sandboxes.☆38Updated 9 years ago
- ☆28Updated 7 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 7 years ago
- Sample libraries to be used with IAT Patcher☆33Updated last year
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated last year
- ☆31Updated this week
- Various tools, exploits and other short code snippets☆12Updated 5 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 7 years ago
- Public resources NB shares☆18Updated 8 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 7 years ago
- Collection of different ways to execute code outside of the expected entry points☆15Updated 11 years ago
- A simple exploitable ActiveX control for RE/VR☆18Updated 10 years ago
- ☆26Updated 8 years ago