mgrube / recon_22Links
☆10Updated 3 years ago
Alternatives and similar repositories for recon_22
Users that are interested in recon_22 are comparing it to the libraries listed below
Sorting:
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆67Updated 3 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated 2 years ago
- ☆12Updated 3 years ago
- Python wrappers for mal_unpack☆37Updated 2 years ago
- ☆27Updated last year
- ☆30Updated 3 months ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Updated 3 years ago
- ☆31Updated 3 months ago
- Identifies metadata of .NET binary files.☆21Updated last year
- General malware analysis stuff☆37Updated last year
- ☆25Updated 3 years ago
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- ☆37Updated 9 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- ☆18Updated 11 months ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- Offensive RPC PoC☆88Updated 4 years ago
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Updated 3 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 3 years ago
- Bypass Malware Time Delays☆108Updated 3 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- ☆38Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- Small tool to play with IOCs caused by Imageload events☆43Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- CVE-2018-6066 using VBA☆67Updated 3 years ago
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆40Updated 4 years ago