levanvn / APT32_DeobfuscateLinks
My scripts to deobfuscate APT32 malware
☆27Updated 3 years ago
Alternatives and similar repositories for APT32_Deobfuscate
Users that are interested in APT32_Deobfuscate are comparing it to the libraries listed below
Sorting:
- My conference presentations and Materials for them.☆32Updated 2 years ago
- ☆131Updated 2 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆125Updated 4 years ago
- IDA Pro plugin for recognizing known hashes of API function names☆81Updated 3 years ago
- Collection of slides☆33Updated last year
- ☆25Updated 2 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- Windows API Hashes used in the malwares☆42Updated 9 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆14Updated 5 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆123Updated 4 years ago
- Here is python script I wrote for deobfuscation APT32 sample.☆10Updated 4 years ago
- IDA SIG files for multiarch uClibc library☆38Updated 7 years ago
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆187Updated 3 years ago
- Tools for fuzzing RDP☆128Updated 3 years ago
- ☆91Updated 4 years ago
- Windows EoP Bugs☆128Updated 5 years ago
- A small utility to deal with malware embedded hashes.☆52Updated last year
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- Write-ups for FireEye's FLARE-On challenges☆25Updated 5 years ago
- LPE for CVE-2020-1054 targeting Windows 7 x64☆86Updated 5 years ago
- Helper idapython code for reversing kmdf drivers☆72Updated 3 years ago
- two heap address leak bugs in `usosvc` service☆93Updated 4 years ago
- ☆49Updated 6 years ago
- Web user interface and service agent for the monitoring and remote management of WinAFL.☆53Updated last week
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆43Updated 11 months ago
- An command-line RPC method enumerator, born out of RPCView's awesomeness☆104Updated 5 years ago
- ☆162Updated 3 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆121Updated 4 years ago
- win32k use-after-free poc☆72Updated 5 years ago
- Write-ups for crackmes and CTF challenges☆52Updated 2 years ago