hacksysteam / HackSysExtremeVulnerableDriver
HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
☆2,585Updated last week
Alternatives and similar repositories for HackSysExtremeVulnerableDriver:
Users that are interested in HackSysExtremeVulnerableDriver are comparing it to the libraries listed below
- windows kernel security development☆1,984Updated 2 years ago
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆1,874Updated last week
- List of Awesome Advanced Windows Exploitation References☆1,473Updated 3 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆1,918Updated this week
- A collection of links related to VMware escape exploits☆1,400Updated 5 months ago
- Set of tools to analyze Windows sandboxes for exposed attack surface.☆2,121Updated 2 months ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,235Updated this week
- IDA Pro utilities from FLARE team☆2,279Updated 4 months ago
- A fork of AFL for fuzzing Windows binaries☆2,394Updated 2 months ago
- A Coverage Explorer for Reverse Engineers☆2,324Updated 7 months ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,222Updated last year
- Resources for Windows exploit development☆1,557Updated 3 years ago
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆2,845Updated 2 years ago
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆4,054Updated last month
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,432Updated 2 weeks ago
- A curated list of IDA x64DBG, Ghidra and OllyDBG plugins.☆1,344Updated 9 months ago
- Great explanation of Process Hollowing (a Technique often used in Malware)☆1,304Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆3,774Updated 4 months ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,864Updated last month
- Corelan Repository for mona.py☆1,731Updated 11 months ago
- Converts PE into a shellcode☆2,462Updated last year
- Shellcode Compiler☆1,087Updated 6 months ago
- Demos of various injection techniques found in malware☆791Updated 3 years ago
- RpcView is a free tool to explore and decompile Microsoft RPC interfaces☆954Updated last year
- Hook system calls, context switches, page faults and more.☆2,502Updated last year
- A Pin Tool for tracing API calls etc☆1,385Updated last month
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,749Updated this week
- This is the list of all rootkits found so far on github and other sites.☆1,298Updated last year
- Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)☆2,257Updated 2 weeks ago
- awesome-linux-rootkits☆1,791Updated last month