levanvn / APT32_Deobfuscate
My scripts to deobfuscate APT32 malware
☆26Updated 2 years ago
Alternatives and similar repositories for APT32_Deobfuscate:
Users that are interested in APT32_Deobfuscate are comparing it to the libraries listed below
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆14Updated 4 years ago
- Collection of slides☆33Updated 9 months ago
- My conference presentations and Materials for them.☆32Updated 2 years ago
- An command-line RPC method enumerator, born out of RPCView's awesomeness☆101Updated 5 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆96Updated 4 years ago
- Windows API Hashes used in the malwares☆40Updated 9 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆122Updated 4 years ago
- ☆130Updated 2 years ago
- Windows Common Log File System Driver POC☆94Updated 3 years ago
- Here is python script I wrote for deobfuscation APT32 sample.☆10Updated 3 years ago
- ☆12Updated 4 years ago
- ☆47Updated 5 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆121Updated 4 years ago
- A small utility to deal with malware embedded hashes.☆49Updated last year
- CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发☆81Updated 3 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆122Updated 3 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆31Updated 5 years ago
- LPE for CVE-2020-1054 targeting Windows 7 x64☆86Updated 4 years ago
- ☆21Updated 4 years ago
- ☆24Updated last year
- Super IOCTL Basic Fuzzer☆13Updated 5 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆93Updated 5 years ago
- ☆12Updated 3 years ago
- a State-Machine reversing exercise☆12Updated 3 years ago
- All the materials in BlueHat 2019 Seattle will be realeased here.☆67Updated 5 years ago
- Write-ups for FireEye's FLARE-On challenges☆25Updated 5 years ago
- win32k use-after-free poc☆71Updated 4 years ago
- Win32k Exploit by Grant Willcox☆88Updated 5 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆48Updated 4 years ago