mgrube / GRUBKit
Skeleton project for your own GRUB-based bootkit
☆15Updated 5 years ago
Alternatives and similar repositories for GRUBKit:
Users that are interested in GRUBKit are comparing it to the libraries listed below
- ☆27Updated 5 years ago
- Flare-On solutions☆36Updated 5 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 6 years ago
- Radare2 Metadata Extraction to Elasticsearch☆22Updated 11 months ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- ☆28Updated 6 months ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆55Updated 2 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆51Updated 6 years ago
- ☆32Updated 10 months ago
- ☆23Updated 4 years ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆35Updated 4 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆15Updated 4 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 3 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- ☆13Updated 5 years ago
- ☆11Updated 3 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Collection of red machine learning projects☆40Updated 3 years ago
- ☆13Updated 5 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆52Updated 5 years ago
- ☆14Updated 3 years ago
- Crystal Anti-Exploit Protection 2012☆37Updated 4 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆28Updated 4 years ago