jeffli678 / writeupsLinks
writeups for CTFs and other stuff
☆23Updated 4 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- A static analysis tool that helps security researchers scan a list of Windows kernel drivers for common vulnerability patterns in drivers…☆71Updated 4 years ago
- A set of small utilities, helpers for PIN tracers☆35Updated 2 months ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- ☆90Updated 5 years ago
- ☆48Updated 5 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆74Updated 2 years ago
- ☆51Updated 5 years ago
- Slides from various conference talks☆37Updated 2 years ago
- Helper idapython code for reversing kmdf drivers☆74Updated 3 years ago
- ☆49Updated 5 years ago
- Tutorial on how to write the dumbest obfuscator I could think of.☆178Updated 5 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆37Updated 4 years ago
- PoC for hiding PE exports☆67Updated 5 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Updated last year
- Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.☆78Updated 2 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Updated 5 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104Updated 5 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆40Updated 3 years ago
- Abusing exceptions for code execution.☆113Updated 2 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Updated 3 years ago
- A code parser for C-Style header files that lets you to parse function's prototypes and data types used in their parameters.☆94Updated 3 years ago
- Windows API listing in JSON format - generated from SDK headers + SDK API documentation☆66Updated 5 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆49Updated 5 years ago
- A fast execution trace symbolizer for Windows.☆129Updated last year
- Fileless persistence, attacks and anti-forensic capabilties.☆93Updated 7 years ago
- Windows API Hashes used in the malwares☆42Updated 10 years ago
- Binary Ninja plugin for exploring Structured Exception Handlers☆82Updated last year