☆18May 9, 2020Updated 5 years ago
Alternatives and similar repositories for syscall
Users that are interested in syscall are comparing it to the libraries listed below
Sorting:
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆12Jul 21, 2019Updated 6 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- Asus AsIO2 Local Privilege Escalation exploit (based on ReWolf's MSI exploit)☆14Apr 5, 2020Updated 5 years ago
- Windows Application Attack Surface Analyzer☆24Feb 22, 2024Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆22Sep 27, 2020Updated 5 years ago
- ☆21Sep 25, 2023Updated 2 years ago
- AttackMatrix is a Python module and/or webpage to interact with and explore MITRE's ATT&CK's matrices.☆17Apr 19, 2023Updated 2 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- Identify and extract files from container formats using unblob.☆26Nov 19, 2024Updated last year
- Evaluation of two binary mutation engines based on ddisasm and rev.ng☆19Nov 21, 2022Updated 3 years ago
- Export disassemblies into Protocol Buffers☆21Jul 18, 2025Updated 7 months ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Jan 3, 2020Updated 6 years ago
- Virtual machine introspection library based on libvmi - parts of this work have been funded by Deutsche Forschungsgemeinschaft (DFG) – pr…☆31Mar 3, 2022Updated 4 years ago
- ☆61Jun 26, 2022Updated 3 years ago
- A library for patching ELFs☆62Dec 4, 2020Updated 5 years ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 4 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Dec 13, 2019Updated 6 years ago
- Some CTF Write-ups☆27Feb 7, 2022Updated 4 years ago
- Ghidra data type archive for Windows driver analysis☆29Oct 10, 2024Updated last year
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆73Feb 28, 2020Updated 6 years ago
- Common Corpus is used to build coverage-minimized corpus data sets for fuzzing.☆29Aug 16, 2023Updated 2 years ago
- Playing around with token manipulation in C#.☆29Nov 6, 2019Updated 6 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- With xshellex you can paste any kind of c-shellcode strings in x64dbg, ollydbg & immunity debugger☆41Aug 11, 2023Updated 2 years ago
- A Reverse Engineering Assistant leveraging Retrieval-Augmented Generation (RAG) and the LLaMA-3.1-8B-Instant Large Language Model (LLM). …☆36Nov 26, 2025Updated 3 months ago
- A cross-platform plugin for Ghidra that provides deep linking support. This enables the generation of clickable disas:// links that can b…☆42Jan 14, 2026Updated last month
- ☆28Aug 4, 2022Updated 3 years ago
- ☆37Nov 16, 2023Updated 2 years ago
- ☆80Nov 7, 2024Updated last year
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- "Pwntools does not support Windows. Use a real OS ;)" — Zach Riggle, 2015☆94Sep 12, 2019Updated 6 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆77Sep 23, 2022Updated 3 years ago
- Anti-Debugging detection and obufuscation techniques that involved the use of Win32 API functions.☆34Apr 4, 2016Updated 9 years ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆40Jun 16, 2024Updated last year
- ☆32Jul 1, 2021Updated 4 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆46Jul 16, 2023Updated 2 years ago