hasherezade / challsLinks
My solutions for random crackmes and other challenges
β12Updated 5 years ago
Alternatives and similar repositories for challs
Users that are interested in challs are comparing it to the libraries listed below
Sorting:
- π§ A simple kernel-level rootkitβ21Updated 9 years ago
- β13Updated 8 years ago
- it's a simple LKM rootkit.β12Updated 9 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the β¦β10Updated 10 years ago
- Hyper-V virtual switch packet capturing extension with libpcap / Wireshark formatβ13Updated 11 years ago
- just a basic rootkit for learning how to playing sys_call_tableβ15Updated 9 years ago
- Common Malware Techniquesβ13Updated 2 years ago
- Prototype for an in memory fuzzerβ13Updated 8 years ago
- Framework complet d'analyse de malwareβ12Updated 9 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.β23Updated 7 years ago
- Shellcode injection using debugging APIsβ19Updated 11 years ago
- β10Updated 7 years ago
- simple rootkit for computer security classβ14Updated 13 years ago
- β14Updated 8 years ago
- PCAUSA Rawether for Windows Local Privilege Escalationβ39Updated 8 years ago
- Plugin for x64dbg to break on unresolved APIs.β12Updated 8 years ago
- Library for Windows XML Event Log (EVTX) data typesβ18Updated this week
- fun rootkits stuff!β19Updated 10 years ago
- β11Updated 10 years ago
- Malware monitor template based on MinHookβ17Updated 10 years ago
- API logger plugin for Intel Pintoolβ14Updated 8 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )β10Updated 9 years ago
- Zerokit shared codeβ17Updated 6 years ago
- findLoop - find possible encryption/decryption or compression/decompression codeβ26Updated 6 years ago
- This is a fuzzer for Windows SEH buffer overflow.β15Updated 8 years ago
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentationβ¦β20Updated 8 years ago
- β16Updated 8 years ago
- β20Updated 6 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.β22Updated 8 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easilyβ14Updated 7 years ago