eclypsium / Publications
Slides, papers, etc
☆31Updated last year
Alternatives and similar repositories for Publications:
Users that are interested in Publications are comparing it to the libraries listed below
- Some sample code from my Zero Nights 2017 presentation.☆62Updated 7 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Updated 5 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- ☆44Updated 6 years ago
- ☆51Updated 8 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 6 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 6 years ago
- ☆43Updated 6 years ago
- This is just my personal compilation of APT malware from whitepaper releases, documents and malware samples from my personal research.☆31Updated 5 years ago
- Radamsa fuzzer extension for Burp Suite☆23Updated 11 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Proof of Concept's provided by Source Incite☆37Updated 7 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆93Updated 3 years ago
- ☆34Updated 7 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 6 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆55Updated 7 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 7 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆68Updated 7 years ago
- ☆52Updated 9 years ago
- PoC for Foxit Reader CVE-2018-14442☆58Updated 6 years ago
- A curated list of awesome malware analysis tools and resources☆45Updated 4 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- Rootkit Detector for UNIX☆61Updated last year
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- ☆23Updated 9 years ago