sondt99 / Caro-Game-ProjectLinks
Sản phẩm "Cờ Caro cổ điển" - Project 1
☆1Updated last year
Alternatives and similar repositories for Caro-Game-Project
Users that are interested in Caro-Game-Project are comparing it to the libraries listed below
Sorting:
- A web application dedicated to write sysmon configuration file☆11Updated 2 months ago
- ☆10Updated last year
- Các ví dụ và tài liệu tham khảo☆9Updated last year
- A Python-based tool for analyzing IoT firmware, supporting both filesystem-based and RTOS-based (e.g. FreeRTOS, Zephyr) images. Features …☆18Updated 2 months ago
- CTF Scoreboard Archive is a web app for storing and displaying CTF scoreboards, supporting links (CTFd, rCTF), MHTML uploads, and GIF gen…☆12Updated 8 months ago
- A powerful and flexible Python-based network scanning framework. Inspired by Nmap, designed to combine simplicity and effectiveness for b…☆31Updated 2 months ago
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆66Updated 2 years ago
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆196Updated 3 months ago
- Python based WinDbg script to automate the search for code caves in binaries and libraries.☆50Updated 6 months ago
- Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread☆224Updated last month
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆228Updated 8 months ago
- ☆260Updated last year
- Reflective DLL Injection Made Bella☆229Updated 6 months ago
- A reverse shell for Windows and Linux written in C.☆77Updated 3 years ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆350Updated 5 months ago
- Distributed Computing Interaction Framework: Optimizing the algorithm with the Server-Worker model☆18Updated last year
- early cascade injection PoC based on Outflanks blog post☆221Updated 8 months ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆127Updated 6 months ago
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆317Updated 9 months ago
- A curated list of ressources for Volatility 2 & 3☆12Updated last year
- ☆157Updated 4 months ago
- Sleep obfuscation in golang based on ekko☆11Updated last year
- ☆140Updated last month
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆296Updated last year
- Windows rootkit designed to work with BYOVD exploits☆200Updated 6 months ago
- kernel callback removal (Bypassing EDR Detections)☆179Updated 3 months ago
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆344Updated 11 months ago
- Signatus - A Vulnerable TCP server to practice Win32 exploitation☆49Updated 4 years ago
- Collect Windows telemetry for Maldev☆373Updated last week
- Shellcode Loader Library.☆10Updated 6 months ago