husseinmuhaisen / Hypervisor
The most comprehensive resource for Virtualization with a focus on Cybersecurity, Learn, exploit, read, and create let's make the industry safer by sharing and learning.
☆93Updated last week
Related projects ⓘ
Alternatives and complementary repositories for Hypervisor
- Centralized resource for listing and organizing known injection techniques and POCs☆218Updated last week
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆37Updated 10 months ago
- ☆130Updated last year
- ☆277Updated this week
- ☆103Updated 3 months ago
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆96Updated last year
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆239Updated last week
- ☆81Updated 2 years ago
- Recon 2023 slides and code☆78Updated last year
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆37Updated 2 months ago
- Basic reverse shell in C using socket() with complete explanation☆65Updated last year
- ☆94Updated 2 months ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆63Updated 2 months ago
- A Repository to Track Anti-Forensic Techniques☆101Updated last year
- Tools for analyzing EDR agents☆208Updated 4 months ago
- ☆104Updated this week
- Aplos an extremely simple fuzzer for Windows binaries.☆66Updated 7 months ago
- Offensive Lua.☆175Updated 11 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆46Updated 10 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆107Updated last week
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆259Updated last year
- ☆123Updated last year
- ☆309Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆174Updated 10 months ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆65Updated last year
- ☆105Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated 5 months ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆69Updated 7 years ago
- ☆95Updated last week
- Slides & Code snippets for a workshop held @ x33fcon 2024☆236Updated 4 months ago