odzhan / aes_dust
Unlicensed tiny / small portable implementation of 128/256-bit AES encryption in C, x86, AMD64, ARM32 and ARM64 assembly
☆123Updated this week
Alternatives and similar repositories for aes_dust:
Users that are interested in aes_dust are comparing it to the libraries listed below
- Abusing exceptions for code execution.☆109Updated 2 years ago
- Tiny loaders for various binary formats.☆234Updated 8 years ago
- ☆46Updated 2 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 3 years ago
- Enumerate user mode shared memory mappings on Windows.☆117Updated 4 years ago
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆73Updated last year
- Samples from my book Windows Native API programming☆59Updated 7 months ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆119Updated last week
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆147Updated this week
- Unofficial Common Log File System (CLFS) Documentation☆169Updated 3 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆70Updated last year
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆160Updated 2 months ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆74Updated 3 years ago
- POC of a better implementation of GetProcAddress for ntdll using binary search☆94Updated 10 months ago
- Linux process injection PoCs☆28Updated 9 months ago
- curiosity got me here☆36Updated 6 months ago
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆60Updated last year
- Windows Kernel Programming Experiments☆82Updated 2 years ago
- In line function hooking LKM rootkit☆51Updated 4 years ago
- Code injection from Linux kernel to a process☆19Updated last year
- An ELF / PE binary packer written in pure C, made for fun☆81Updated 10 months ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆243Updated 2 years ago
- ☆157Updated 3 years ago
- Three Tiny Examples of Directly Using Vista's NtCreateUserProcess☆85Updated 9 years ago
- short crackme for Windows XP SP3 (32 bit version). ring0 stuff. IMO very fun x-)☆23Updated last year
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆118Updated last year
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆79Updated 4 years ago
- ☆265Updated 2 years ago
- ☆106Updated 2 years ago
- uefi diskless persistence technique + OVMF secureboot bypass☆53Updated 9 months ago