redcanaryco / exploit-primitive-playground
☆59Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for exploit-primitive-playground
- PE File Blessing - To continue or not to continue☆86Updated 4 years ago
- Radare2 Metadata Extraction to Elasticsearch☆21Updated 6 months ago
- Vulnerabilities, exploits, and PoCs☆34Updated 2 months ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆26Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- ☆60Updated 4 years ago
- TrashDBG the world's worse debugger☆24Updated 2 years ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆89Updated 3 years ago
- Google Chrome Use After Free☆55Updated 2 years ago
- Winbindex bot to pull in binaries for specific releases☆46Updated last year
- Go Lang Portable Executable Parser☆37Updated 3 years ago
- ☆47Updated 4 years ago
- C# User Simulation☆33Updated 2 years ago
- A repo to support the book☆103Updated 3 years ago
- Unpacking and decryption tools for the Emotet malware☆46Updated 2 years ago
- Red Team Operator: Malware Development Essentials Course☆92Updated 4 years ago
- ELF Sectional docking payload injector system☆21Updated 2 years ago
- runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is base…☆36Updated last year
- This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆30Updated 4 years ago
- Scripts, Yara rules and other files developed during malware investigations☆24Updated 2 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆84Updated 3 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 4 years ago
- Yara Rules for Modern Malware☆67Updated 8 months ago
- In 'n Out - See what goes in and comes out of PEs☆32Updated 2 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆60Updated 2 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆66Updated 2 years ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆78Updated 3 years ago
- Small visualizator for PE files☆67Updated last year
- Dump objects from .NET dumps.☆48Updated 2 years ago
- Documentation and parsers for different anti-virus quarantine formats.☆41Updated 3 years ago