stephenJoester / fake_news_detectionLinks
☆10Updated 2 years ago
Alternatives and similar repositories for fake_news_detection
Users that are interested in fake_news_detection are comparing it to the libraries listed below
Sorting:
- National Graduation Exam Score from 2022 to 2024☆11Updated last year
- VinCSS Reverse Engineering, Malware Analysing Tools & Ultilities☆27Updated 4 years ago
- Process Injection using Thread Name☆294Updated 9 months ago
- ☆42Updated last year
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆222Updated 2 years ago
- Reverse engineering winapi function loadlibrary.☆231Updated 2 years ago
- This GitHub repository contains benign specimens; however, the techniques demonstrated herein could potentially be exploited for maliciou…☆17Updated last year
- Small tool to convert beteween the PE alignments (raw and virtual).☆109Updated 3 years ago
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆358Updated last year
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆268Updated last year
- PoC for thread pool based process injection in Windows.☆120Updated 10 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated 3 weeks ago
- Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread☆260Updated 4 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆124Updated last year
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆320Updated 2 years ago
- Writeups for CTF challenges☆35Updated 2 years ago
- ☆273Updated 3 years ago
- Reflective DLL Injection Made Bella☆248Updated last year
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 6 years ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆435Updated last month
- Collect Windows telemetry for Maldev☆454Updated 2 months ago
- ☆259Updated 2 years ago
- a tool used to analyze and monitor in named pipes☆193Updated last year
- Shellcode IDE — makes developing and analyzing shellcode much more convenient.☆111Updated 2 months ago
- ( 0day ) Local Privilege Escalation in IObit Malware Fighter☆164Updated 10 months ago
- Compile shellcode into an exe file from Windows or Linux.☆71Updated 7 months ago
- Admin to Kernel code execution using the KSecDD driver☆260Updated last year
- Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven☆250Updated last year
- Windows x64 kernel mode rootkit process hollowing POC.☆189Updated 2 years ago
- Reverse Engineering challenges☆36Updated 5 years ago