maycon / talks
☆10Updated last year
Alternatives and similar repositories for talks:
Users that are interested in talks are comparing it to the libraries listed below
- Published Articles of the Past (trying to be as complete as possible)☆14Updated 4 years ago
- laboratório sobre buffer overflows☆15Updated 7 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆20Updated 8 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 10 years ago
- public bugs/proof of concepts☆47Updated 3 years ago
- Malpimp is an advanced API tracing tool and designed to automate the reverse engineering process. In the backend it uses pydbg to hook t…☆8Updated 8 years ago
- Python script to inject and run shellcodes through TLS callbacks☆50Updated 9 years ago
- ☆30Updated 8 years ago
- ☆22Updated 7 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- The Horrific Omnipotent Rootkit☆22Updated 7 years ago
- ☆51Updated 7 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 5 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- My presentations from different conferences☆15Updated 6 years ago
- Demo bootloaders - created just for fun☆22Updated 7 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆42Updated 8 years ago
- Test suite for bypassing Malware sandboxes.☆38Updated 10 years ago
- ☆33Updated 9 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Updated 8 years ago
- Automatically exported from code.google.com/p/ioctlbf☆16Updated 9 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆31Updated 8 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow with Stack Cookie Bypass Exploit☆18Updated 8 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago
- Exploit Reliability Testing System☆34Updated 9 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆14Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago