dsnezhkov / elfpackLinks
☆48Updated 3 years ago
Alternatives and similar repositories for elfpack
Users that are interested in elfpack are comparing it to the libraries listed below
Sorting:
- Inter-Process Communication Mechanisms☆28Updated 5 years ago
- ☆21Updated 2 years ago
- PoC of macho loading from memory☆57Updated 11 months ago
- Extract data of TTD trace file to a minidump☆30Updated 2 years ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆33Updated 6 years ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated last year
- Winbindex bot to pull in binaries for specific releases☆48Updated 2 years ago
- Load a dynamic library from memory using a fuse mount☆31Updated 2 years ago
- A Poc on blocking Procmon from monitoring network events☆108Updated 3 months ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- ☆83Updated 2 months ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated 2 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Updated 3 years ago
- ☆28Updated 6 years ago
- A few examples of how to trap virtual memory access on Windows.☆35Updated 10 months ago
- ☆12Updated 2 years ago
- ☆18Updated 5 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆114Updated 4 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- Specialized tool to dump Position Independent Code.☆22Updated 5 years ago
- A collection of shellcode hashes☆17Updated 7 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆56Updated 3 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 3 years ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆45Updated 2 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 3 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 4 years ago
- ☆37Updated 2 years ago