jeffli678 / writeupsLinks
writeups for CTFs and other stuff
☆23Updated 5 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- A static analysis tool that helps security researchers scan a list of Windows kernel drivers for common vulnerability patterns in drivers…☆71Updated 4 years ago
- Slides from various conference talks☆37Updated 2 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- ☆48Updated 5 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated 2 years ago
- A set of small utilities, helpers for PIN tracers☆36Updated 4 months ago
- Neutralize KEPServerEX anti-debugging techniques☆33Updated 2 years ago
- Binary Ninja plugin for exploring Structured Exception Handlers☆82Updated last year
- ☆91Updated 5 years ago
- WslinkVMAnalyzer is a tool to facilitate analysis of code protected by a virtual machine featured in Wslink malware☆48Updated 3 years ago
- Extract data of TTD trace file to a minidump☆31Updated 2 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- A code parser for C-Style header files that lets you to parse function's prototypes and data types used in their parameters.☆94Updated 3 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- ☆49Updated 5 years ago
- Tutorial on how to write the dumbest obfuscator I could think of.☆179Updated 5 years ago
- This utility allows you to lock every available memory regions of an arbitrary process into its working set.☆69Updated 2 years ago
- Abusing exceptions for code execution.☆113Updated 3 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆50Updated 5 years ago
- This repository contains D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation.☆36Updated 5 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Updated last year
- ☆148Updated 2 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 3 years ago
- A fast execution trace symbolizer for Windows.☆130Updated last year
- A simple but useful project maybe help you reverse Windows.☆41Updated last year
- PoC for hiding PE exports☆67Updated 5 years ago
- ☆163Updated 4 years ago
- ☆14Updated 4 years ago
- Windows API listing in JSON format - generated from SDK headers + SDK API documentation☆67Updated 5 years ago