odzhan / aes_dust
Unlicensed tiny / small portable implementation of 128/256-bit AES encryption in C, x86, AMD64, ARM32 and ARM64 assembly
☆123Updated 3 weeks ago
Alternatives and similar repositories for aes_dust:
Users that are interested in aes_dust are comparing it to the libraries listed below
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆74Updated 3 years ago
- Abusing exceptions for code execution.☆109Updated 2 years ago
- An ELF / PE binary packer written in pure C, made for fun☆86Updated 11 months ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆81Updated 4 years ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆170Updated 3 months ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 3 years ago
- curiosity got me here☆36Updated 7 months ago
- Three Tiny Examples of Directly Using Vista's NtCreateUserProcess☆86Updated 9 years ago
- ☆267Updated 2 years ago
- In line function hooking LKM rootkit☆51Updated 5 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆110Updated 4 years ago
- Linux process injection PoCs☆28Updated 10 months ago
- Tiny loaders for various binary formats.☆236Updated 8 years ago
- ntdll.h - compatible with MSVC 6.0, Intel C++ Compiler and MinGW. Serves as a complete replacement for Windows.h☆134Updated 5 years ago
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆73Updated last year
- https://blog.f-secure.com/hiding-malicious-code-with-module-stomping/☆118Updated 5 years ago
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Updated 2 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆244Updated 2 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆209Updated 5 years ago
- ☆70Updated 2 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆225Updated 2 years ago
- ☆47Updated 2 years ago
- Unofficial Common Log File System (CLFS) Documentation☆169Updated 3 years ago
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆149Updated 4 years ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆150Updated this week
- Packer/Protector for x86-64 ELF binaries on Linux☆145Updated 3 years ago
- Samples from my book Windows Native API programming☆60Updated 2 weeks ago
- Files for the packer tutorial☆72Updated 4 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆97Updated last year
- A utility to fix intentionally corrupted UPX packed files.☆83Updated last year