robindimyan / MalwareVulnerabilitiesExposures
Malware vulnerability research. Coming soon..
☆12Updated 4 years ago
Alternatives and similar repositories for MalwareVulnerabilitiesExposures:
Users that are interested in MalwareVulnerabilitiesExposures are comparing it to the libraries listed below
- Liberating dem proprietary APT implants☆21Updated 5 years ago
- Simple shellcode injector.☆14Updated 6 years ago
- ☆24Updated 3 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago
- Kernel mode windows NT API logger☆22Updated 5 years ago
- Experiments on the Windows Internals☆30Updated 5 years ago
- ☆31Updated 4 years ago
- ☆45Updated 6 years ago
- Different code-injections techniques under a common tool☆30Updated 4 years ago
- Flare-On solutions☆36Updated 5 years ago
- ☆16Updated 5 years ago
- ☆49Updated 4 years ago
- ☆21Updated 4 years ago
- ☆22Updated 4 years ago
- ☆16Updated 3 years ago
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 4 years ago
- A repository where I share my injection implemintations☆29Updated 4 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆42Updated 7 years ago
- ☆26Updated 6 years ago
- A small library helping to parse commandline parameters (for C/C++)☆54Updated last year
- Self-Loading Registration Free COM Functions☆11Updated 5 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 2 years ago
- ☆22Updated 4 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆23Updated 4 years ago
- Example for PagedOut!☆24Updated 5 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 6 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 6 years ago