stephenJoester / fake_news_detectionLinks
☆10Updated last year
Alternatives and similar repositories for fake_news_detection
Users that are interested in fake_news_detection are comparing it to the libraries listed below
Sorting:
- National Graduation Exam Score from 2022 to 2024☆11Updated last year
- VinCSS Reverse Engineering, Malware Analysing Tools & Ultilities☆27Updated 3 years ago
- A manual PE mapping implementation, aka reflective loader☆19Updated 3 years ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆103Updated 2 years ago
- ☆38Updated last year
- UnpacMe IDA Byte Search☆28Updated last year
- Simple Packer PE File☆16Updated 6 years ago
- [ARCHIVED] Early work on Abyss (Windows UEFI Bootkit).☆44Updated 2 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆120Updated last year
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆315Updated last year
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆234Updated 11 months ago
- Writeups for CTF challenges☆32Updated last year
- My write-up for challenge 11 flareon 9: unpacking pyarmor☆61Updated 2 years ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆403Updated last week
- ☆21Updated last year
- simple user-mode Rootkit☆106Updated 2 years ago
- Reverse Engineering challenges☆35Updated 4 years ago
- a tool used to analyze and monitor in named pipes☆185Updated 11 months ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆154Updated last year
- Process Injection using Thread Name☆282Updated 6 months ago
- Vulnerable driver research tool, result and exploit PoCs☆217Updated last year
- Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆305Updated last year
- This GitHub repository contains benign specimens; however, the techniques demonstrated herein could potentially be exploited for maliciou…☆17Updated last year
- Dreg's setup for lldb reversing. The simplest and easiest possible, without scripting. lldb debugging setup.☆14Updated last year
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆353Updated last year
- Admin to Kernel code execution using the KSecDD driver☆258Updated last year
- Helpful WinDBG command for kernel debugging☆24Updated 4 years ago
- OFFZONE 2024 Malware Persistence workshop☆21Updated 10 months ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆32Updated 5 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆113Updated 2 years ago