mgrube / GRUBKitLinks
Skeleton project for your own GRUB-based bootkit
☆16Updated 5 years ago
Alternatives and similar repositories for GRUBKit
Users that are interested in GRUBKit are comparing it to the libraries listed below
Sorting:
- Radare2 Metadata Extraction to Elasticsearch☆23Updated last year
- ☆28Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- Flare-On solutions☆36Updated 5 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆11Updated 3 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- ☆13Updated 6 years ago
- ☆48Updated 5 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- ☆18Updated 5 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- ☆46Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- ☆36Updated 5 years ago
- ☆20Updated 5 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- ☆86Updated 10 months ago
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- Script(s) to assist with the setup of WinDBG & mona.py on a Windows 10 VM☆27Updated 2 years ago
- A git history of Windows filesystems☆76Updated 4 years ago
- Collection of red machine learning projects☆40Updated 3 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 6 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- Control Flow Guard Teleportation demo☆23Updated 6 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago