immunityinc / HardwareImplantRecipe
"A Practical Recipe for Hardware Implants" presentation materials.
☆13Updated 4 years ago
Alternatives and similar repositories for HardwareImplantRecipe:
Users that are interested in HardwareImplantRecipe are comparing it to the libraries listed below
- The Multiplatform Linux Sandbox☆15Updated last year
- Win32k Elevation of Privilege PocUpdated 5 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆10Updated 8 years ago
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 7 years ago
- ☆16Updated 3 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 7 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- ☆36Updated 5 years ago
- Crystal Anti-Exploit Protection 2012☆37Updated 4 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆14Updated 4 years ago
- module for certexfil☆15Updated 2 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- ☆16Updated 4 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 4 years ago
- ☆33Updated 7 years ago
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆23Updated 4 years ago
- Green shellcode challenge tools☆22Updated 6 years ago
- ☆12Updated 8 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- ☆13Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- ☆16Updated 7 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago