screeck / YouTube
This repo contains my writeups and code from YouTube videos
☆27Updated last month
Related projects: ⓘ
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆67Updated 3 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆147Updated 6 months ago
- My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is…☆27Updated 2 years ago
- 🐲 catppuccin kali rice☆26Updated 5 months ago
- Reverse Engineering All-In-One. Quick refreshers into the world of reverse engineering.☆26Updated 3 years ago
- capNcook - a dark web exploration tool☆66Updated 8 months ago
- 「💻」Simple kernel made in 16-bit assembly only☆13Updated last year
- ☆35Updated last year
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆29Updated last year
- Full exploit chain for Faronics-DeepFreeze-8☆3Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆37Updated this week
- A simple Reverse Engineering challenge for starter in Reverse Engineering Attack to understand the basic concept of Reverse Engineering &…☆59Updated last year
- Firewall Application Using Python3☆16Updated 2 years ago
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆19Updated last year
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆51Updated 3 months ago
- Docker container for quickly analyzing Linux malware☆55Updated last year
- ☆26Updated this week
- Malware Development for Ethical Hackers, published by Packt☆120Updated last month
- ☆12Updated 4 years ago
- My new C2 framework☆39Updated last year
- A simple C program to demonstrate a Buffer Overflow.☆11Updated 3 years ago
- notes and ramblings from my OSCP/PenTesting Studies☆66Updated 10 months ago
- Crappy Golang code to list local listening ports and their associated processes.☆28Updated last year
- ☆65Updated 3 years ago
- a small wiper malware programmed in c#☆43Updated last year
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆33Updated 2 years ago
- Reverse Engineering and Malware Analysis Roadmap☆35Updated last month
- CMU Systems Programming course resources incl. course website, labs, schedule, & extra material. Books: "Computer Systems: A Programmer's…☆27Updated last year
- CVE-2023-38831 PoC (Proof Of Concept)☆62Updated last month
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆107Updated last year