inversecos / ios-moneymachineLinks
☆25Updated 3 years ago
Alternatives and similar repositories for ios-moneymachine
Users that are interested in ios-moneymachine are comparing it to the libraries listed below
Sorting:
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 3 months ago
- General malware analysis stuff☆37Updated 10 months ago
- ☆10Updated 3 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆54Updated 6 months ago
- BINARLY Research Tools and PoCs☆36Updated 9 months ago
- A collection of PoCs for different injection techniques on Windows!☆44Updated last year
- IDA Python scripts☆37Updated 3 months ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆24Updated 3 years ago
- ☆59Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- Make an Linux Kernel rootkit visible again.☆53Updated 4 months ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆40Updated 11 months ago
- ☆27Updated 7 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- ☆18Updated 6 months ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆32Updated last year
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆15Updated 3 years ago
- Lena's scripts/code/resources for malware analysis☆27Updated last year
- Progress of learning kernel development☆14Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Get started with writing your first ever Windows Driver☆32Updated last year
- Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)☆59Updated last month
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆54Updated 3 years ago
- ☆48Updated last year
- ☆39Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 7 months ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆44Updated 3 months ago
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆83Updated last year
- A utility that can be used to launch an executable with a DLL injected☆20Updated last year
- AES-256 Microsoft Cryptography API Example Use.☆31Updated last year