paranoidninja / 0xdarkvortex-Reverse-EngineeringLinks
This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja
☆46Updated 4 years ago
Alternatives and similar repositories for 0xdarkvortex-Reverse-Engineering
Users that are interested in 0xdarkvortex-Reverse-Engineering are comparing it to the libraries listed below
Sorting:
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 4 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆51Updated 6 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Updated 6 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- ☆51Updated 8 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆76Updated 5 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- Antivirus Emulator Fingerprints☆29Updated 6 years ago
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆15Updated 3 years ago
- ☆22Updated 4 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆43Updated 8 months ago
- A repository where I share my injection implemintations☆29Updated 4 years ago
- Win32k Elevation of Privilege Poc☆1Updated 6 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Updated 6 years ago
- ☆13Updated 8 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- Code that can be used as a reference, library, or inspiration for hacking Windows memory.☆50Updated 5 years ago
- NT AUTHORITY\SYSTEM☆39Updated 4 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 10 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Flare-On solutions☆36Updated 5 years ago
- Python 3 server used to control SK8RAT implant☆36Updated 4 years ago