gsuberland / al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
☆17Updated 5 years ago
Alternatives and similar repositories for al-khaser:
Users that are interested in al-khaser are comparing it to the libraries listed below
- ☆45Updated 6 years ago
- A Proof-of-Concept win32 DLL that makes use of netbios session token replay to propagate through a Windows Domain☆25Updated 6 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 4 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆38Updated 8 years ago
- A MITM proxy server for reflective DLL injection through WinINet☆15Updated 6 years ago
- ☆17Updated 4 years ago
- A simple API monitor for Windbg☆63Updated 7 years ago
- Anti-Debugging detection and obufuscation techniques that involved the use of Win32 API functions.☆34Updated 8 years ago
- A session-0 capable dll injection utility☆76Updated 6 years ago
- Source code of my KeygenMe V7 challenge☆22Updated 6 years ago
- ☆22Updated 6 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- ☆33Updated 3 years ago
- ☆22Updated 4 years ago
- My conference presentations and publications☆26Updated 3 years ago
- CmdDesktopSwitch is a small utility that lists all windows desktops and provides the option to switch between them. This can be used to i…☆34Updated 8 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Updated 7 years ago
- Public repository for HEVD exploits☆20Updated 6 years ago
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- A VBScript for detecting VirtualBox☆21Updated 9 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆58Updated 8 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆34Updated 6 years ago
- Analyze and attack windows applications using dll hijacking vulnerabilities☆56Updated 5 years ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆35Updated 4 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 4 years ago