redcanaryco / exploit-primitive-playground
☆61Updated 9 months ago
Alternatives and similar repositories for exploit-primitive-playground:
Users that are interested in exploit-primitive-playground are comparing it to the libraries listed below
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- Vulnerabilities, exploits, and PoCs☆35Updated last week
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- a pstree mod that prints other helpful information and with added functionality☆24Updated 4 years ago
- Radare2 Metadata Extraction to Elasticsearch☆22Updated 11 months ago
- ELF Sectional docking payload injector system☆21Updated 2 years ago
- Crystal Anti-Exploit Protection 2012☆37Updated 4 years ago
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- Winbindex bot to pull in binaries for specific releases☆47Updated last year
- ☆47Updated 5 years ago
- Public repository for Red Canary Research☆37Updated 4 years ago
- ☆60Updated 5 years ago
- ☆27Updated 5 years ago
- Dump objects from .NET dumps.☆50Updated 3 years ago
- Imphash-like calculation on Golang binaries☆49Updated 2 years ago
- This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆31Updated 4 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆53Updated last year
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- ☆18Updated 4 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 4 years ago
- ☆27Updated 3 years ago
- Tools for offensive security of NetBackup infrastructures☆40Updated last year
- A repo to support the book☆107Updated 3 years ago
- Google Chrome Use After Free☆56Updated 2 years ago
- Proxy system calls over an RPC channel☆98Updated 3 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago