kuciapakrystian / filmoteka-team-no-5-GoITLinks
Filmoteka is a team project that finalizes JS course in GoIT academy
☆16Updated last year
Alternatives and similar repositories for filmoteka-team-no-5-GoIT
Users that are interested in filmoteka-team-no-5-GoIT are comparing it to the libraries listed below
Sorting:
- Important notes and topics on my journey towards mastering Windows Internals☆422Updated last year
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆476Updated 7 months ago
- Centralized resource for listing and organizing known injection techniques and POCs☆669Updated last month
- CAPE core and community parsers☆17Updated this week
- Hardcore Debugging☆929Updated 3 weeks ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆201Updated 4 months ago
- Assortment of hashing algorithms used in malware☆388Updated 2 weeks ago
- Now You See Me, Now You Don't☆1,020Updated this week
- Cybersecurity research results. Simple C/C++ and Python implementations☆288Updated 3 weeks ago
- BYOVD research use cases featuring vulnerable driver discovery and reverse engineering methodology. (CVE-2025-52915, CVE-2025-1055,).☆521Updated 3 months ago
- A utility for playing with cryptography, geared towards ransomware analysis.☆317Updated 5 months ago
- Some of my publicly available Malware analysis and Reverse engineering.☆928Updated last year
- PoC Implementation of a fully dynamic call stack spoofer☆893Updated last year
- Dynamic unpacker based on PE-sieve☆794Updated 4 months ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,237Updated 2 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆673Updated 3 years ago
- Win32 and Kernel abusing techniques for pentesters☆971Updated 2 years ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆586Updated 5 months ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆800Updated last year
- PoCs and tools for investigation of Windows process execution techniques☆954Updated 2 weeks ago
- ☆389Updated 7 months ago
- EDR Lab for Experimentation Purposes☆1,405Updated last week
- ☆776Updated 2 years ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆852Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆752Updated 5 months ago
- A tutorial on how to write a packer for Windows!☆304Updated 2 years ago
- A modern 32/64-bit position independent implant template☆1,288Updated 10 months ago
- HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.☆718Updated 2 years ago
- Reports in .MD format☆21Updated 6 months ago
- Collect Windows telemetry for Maldev☆454Updated 2 months ago