nop-tech / code_caverLinks
Python based WinDbg script to automate the search for code caves in binaries and libraries.
☆52Updated 11 months ago
Alternatives and similar repositories for code_caver
Users that are interested in code_caver are comparing it to the libraries listed below
Sorting:
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆75Updated 2 years ago
- Signatus - A Vulnerable TCP server to practice Win32 exploitation☆51Updated 4 years ago
- Windbg Readable & Dark Green Theme - Own Use☆46Updated 6 years ago
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆78Updated last year
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆62Updated 3 years ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆50Updated 2 years ago
- Payload Generation Framework☆97Updated last year
- A curated list of resources for the OSED journey.☆71Updated 3 years ago
- A collection of code snippets built to assist with breaking chains.☆126Updated last year
- Slides & Code snippets for a workshop held @ x33fcon 2024☆275Updated last year
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆108Updated 3 years ago
- A tool for developing bad character-free shellcode to bypass DEP with WriteProcessMemory (32-bit only)☆72Updated 3 years ago
- .NET/PowerShell/VBA Offensive Security Obfuscator☆176Updated last year
- vulnerable windows binaries for exploitation practice☆48Updated 3 years ago
- SeManageVolumePrivilege to SYSTEM☆140Updated 2 years ago
- Open Source C&C Specification☆272Updated 9 months ago
- Identifies the bytes that Microsoft Defender flags on.☆97Updated 3 years ago
- Shellcode generation and encoding utility☆24Updated 3 years ago
- Code dump from PEN-300/OSEP updated 2022☆42Updated 3 years ago
- ☆315Updated 2 years ago
- ☆259Updated last year
- ☆229Updated last year
- Patch AMSI and ETW☆247Updated last year
- Proof-of-Concept code snippets for a variety of different process injection techniques☆23Updated 2 years ago
- ☆157Updated 6 months ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆313Updated 2 months ago
- A PoC for Early Cascade process injection technique.☆201Updated 10 months ago
- Apply a divide and conquer approach to bypass EDRs☆287Updated 2 years ago
- Tools/scripts I used/developed during the EXP-301 course.☆25Updated 3 years ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆317Updated last month