Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1
☆59Jun 12, 2024Updated last year
Alternatives and similar repositories for xz-malware
Users that are interested in xz-malware are comparing it to the libraries listed below
Sorting:
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- not-so-private-relay☆14Feb 21, 2025Updated last year
- ☆30Aug 24, 2025Updated 6 months ago
- ☆31Dec 5, 2024Updated last year
- A small SSH askpass GUI using GTK+2☆14Dec 20, 2022Updated 3 years ago
- Theo de Raadt as a service☆14Oct 9, 2021Updated 4 years ago
- ☆20Mar 15, 2023Updated 2 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- A tool to generate macOS initial access vectors using Prelude Operator payloads☆18May 25, 2022Updated 3 years ago
- WebKit/JSC CodeQL Databases☆17Dec 15, 2025Updated 2 months ago
- Play with libmalloc☆17Jan 2, 2024Updated 2 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- Here is a collage of reverse engineering topics that I find interesting☆16Dec 10, 2017Updated 8 years ago
- ☆23Feb 28, 2026Updated last week
- A Zellij plugin to get weather information inside the terminal☆21Nov 24, 2023Updated 2 years ago
- ☆144Apr 15, 2024Updated last year
- Source files for my posts☆17Jun 20, 2023Updated 2 years ago
- ☆25May 21, 2021Updated 4 years ago
- PoC code and tools for Black Hat USA 2024☆24Aug 1, 2024Updated last year
- A MBR Fuzzer☆31Apr 3, 2024Updated last year
- A not-curated list of cloud hacking labs☆26Apr 18, 2024Updated last year
- Repository of vulnerabilities disclosed by ESET☆29Jul 13, 2022Updated 3 years ago
- A POC for Windows Extension Host hooking☆24Jul 13, 2019Updated 6 years ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- "Bypassing" HVCI via donor PFN swaps to modify read-only code pages. Call chained kernel functions (kCET and SLAT support), modify read-o…☆95Feb 14, 2026Updated 3 weeks ago
- Runtime smm module loader☆37Jan 12, 2023Updated 3 years ago
- poc code for CVE-2024-38080☆30Sep 1, 2024Updated last year
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆77Sep 8, 2025Updated 5 months ago
- appieSniper is a python program to get notifications on overblijvers at nearby Albert Heijn supermarkets, this way you can claim you pack…☆11Jun 10, 2025Updated 8 months ago
- Reverse Engineering 101 training from our Vulnerability Researcher Development Program (VRDP)☆66Jan 13, 2026Updated last month
- Taking advantage of CRT initialization, to get away with hooking protected applications☆48Nov 2, 2022Updated 3 years ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆37Jul 27, 2021Updated 4 years ago
- Another UEFI runtime bootkit☆37May 8, 2023Updated 2 years ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Nov 24, 2022Updated 3 years ago
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆43Jun 10, 2025Updated 8 months ago
- Learn Microsoft Office 2019, published by Packt☆12Jan 18, 2023Updated 3 years ago