papadoxie / cronOS
My attempt at writing an Operating System from scratch
☆13Updated 2 years ago
Alternatives and similar repositories for cronOS
Users that are interested in cronOS are comparing it to the libraries listed below
Sorting:
- ☆33Updated 2 years ago
- An advanced keylogger with a GUI redirects traffic via TOR, designed to be executed on unix operating systems☆13Updated 4 years ago
- ☆55Updated 3 years ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆97Updated 3 years ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆43Updated last month
- ☆12Updated 4 years ago
- FTDI bricker just for fun - malware POC+hardware hacking CTF☆20Updated 7 months ago
- So recently, I started off with some basic exploit development, Here is a collection of all the stack overflow exploits I programmed for …☆11Updated 3 years ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆81Updated this week
- Bypass Malware Time Delays☆101Updated 2 years ago
- A curated list of resources for the OSED journey.☆63Updated 3 years ago
- ☆38Updated 2 months ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆45Updated last year
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆28Updated 2 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆30Updated 2 years ago
- Tool for extracting credentials locally stored by web browsers☆31Updated 2 years ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆10Updated 11 months ago
- This GitHub repository contains benign specimens; however, the techniques demonstrated herein could potentially be exploited for maliciou…☆16Updated 9 months ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆45Updated 4 years ago
- PoC of a UEFI Petya ransomware☆42Updated 2 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆18Updated 3 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆80Updated 2 months ago
- ☆132Updated last year
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆73Updated 11 months ago
- ☆85Updated 2 years ago
- Repo for malware development practices I post on my blog☆30Updated 7 months ago
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆32Updated 2 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆38Updated 4 years ago
- Get started with writing your first ever Windows Driver☆33Updated last year
- Python based WinDbg script to automate the search for code caves in binaries and libraries.☆49Updated 4 months ago