hacksysteam / Exploitation
Windows Software Exploitation
☆127Updated 8 years ago
Alternatives and similar repositories for Exploitation:
Users that are interested in Exploitation are comparing it to the libraries listed below
- Pazuzu: Reflective DLL to run binaries from memory☆214Updated 4 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Useful Scripts for helping in reverse engeenering☆178Updated 4 years ago
- TDL4 style rootkit to spoof read/write requests to master boot record☆130Updated 7 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 6 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆127Updated 8 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆134Updated 7 years ago
- ☆140Updated 7 years ago
- Frida.re based RunPE (and MapViewOfSection) extraction tool☆111Updated 8 years ago
- some pocs for antivirus evasion☆130Updated last year
- Carberp Banking Trojan☆110Updated 10 years ago
- A Generic Windows Memory Scraping Tool☆70Updated 7 years ago
- Blackhat 2012 Sample Codes☆93Updated 8 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆96Updated 12 years ago
- Tinba Banking Trojan☆84Updated 10 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 7 years ago
- Platform independent peCloak fork based on Capstone☆103Updated 8 years ago
- Passive UAC elevation using dll infection☆73Updated 10 years ago
- Driver Initial Reconnaissance Tool☆122Updated 5 years ago
- Automatically exported from code.google.com/p/malware-lu☆55Updated 5 years ago
- Windows XP 32-Bit Bootkit☆144Updated 10 years ago
- Fork of mona.py with x64dbg support☆101Updated 2 years ago
- Teaching old shellcode new tricks☆204Updated 7 years ago
- windows kernel vulnerability found by me☆91Updated 7 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆60Updated 9 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆151Updated 3 years ago
- ZeroAccess v3 toolkit☆162Updated 7 years ago
- Stuff you might use when exploiting software☆80Updated 9 years ago
- Fileless Ransomware Example☆36Updated 7 years ago