petikvx / vx-ezine
Collection of ezine about virii
☆16Updated 2 years ago
Alternatives and similar repositories for vx-ezine:
Users that are interested in vx-ezine are comparing it to the libraries listed below
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆10Updated 6 years ago
- ☆16Updated 2 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- ☆28Updated 4 months ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆25Updated 3 years ago
- ☆34Updated 7 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆14Updated 4 years ago
- Help deobfuscate VBScript☆15Updated 2 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- ☆22Updated 4 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆10Updated 3 years ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆18Updated 2 years ago
- Collection of IDA helpers☆15Updated 2 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆17Updated last year
- Sources Codes of many Office Malwares☆16Updated 2 years ago
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆27Updated 3 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆35Updated 2 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.☆17Updated 4 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 2 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Some of CrackMes made by me :)☆18Updated 3 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆21Updated last year
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆26Updated 3 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆53Updated 3 years ago