josh0xA / win32-iat
Small attempt at a decent Import Address Table (IAT) Dumper
☆14Updated 3 weeks ago
Related projects: ⓘ
- Zero-Day Code Injection and Persistence Technique☆30Updated 7 years ago
- Baseline/Test for persistence in common Windows Registry locations☆23Updated 5 years ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆71Updated last year
- PoC Thread Execution Hijacking for Win32 Code Injection☆174Updated last month
- A silly PAM module to allow authentication as any user with a single password.☆54Updated 4 years ago
- Ansible scripts to install tools and files wanted on a new Kali Machine☆28Updated 4 years ago
- ☆44Updated this week
- Quick script to find info about a syscall in a target architecture☆18Updated 4 years ago
- Landing page for calebstew.art☆22Updated 2 years ago
- Red Team Operator: Malware Development Essentials Course☆92Updated 4 years ago
- Userland API monitor for threat hunting☆54Updated 4 years ago
- My Malware Analysis Reports☆18Updated 2 years ago
- a collection of Advanced Malwares and APT tools for geek analysts to play with☆43Updated 2 years ago
- Mastering Malware Analysis, published by Packt☆37Updated last year
- x64 Windows Exploit Development☆108Updated 3 weeks ago
- Malware Samples that could be used for teaching students about malware analysis.☆45Updated 5 months ago
- my reading list for reverse engineering malware & exploit development☆11Updated 5 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆14Updated 2 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated last year
- Capa analysis importer for Ghidra.☆61Updated 3 years ago
- My walkthrough of the LPEWorkshop exercises☆38Updated 4 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆39Updated 2 years ago
- Simplified MITRE Use Cases, it describes the Attack and Detection☆40Updated 3 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆137Updated 2 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆16Updated 5 years ago
- ☆55Updated this week
- NT AUTHORITY\SYSTEM☆37Updated 4 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆30Updated 2 years ago
- A collection of my reverse engineering and malware analysis write-ups☆20Updated 3 years ago
- ☆40Updated 3 years ago