stephenJoester / fake_news_detectionLinks
☆10Updated last year
Alternatives and similar repositories for fake_news_detection
Users that are interested in fake_news_detection are comparing it to the libraries listed below
Sorting:
- VinCSS Reverse Engineering, Malware Analysing Tools & Ultilities☆27Updated 4 years ago
- National Graduation Exam Score from 2022 to 2024☆11Updated last year
- My write-up for challenge 11 flareon 9: unpacking pyarmor☆61Updated 3 years ago
- Writeups for CTF challenges☆33Updated 2 years ago
- ☆23Updated last year
- Vulnerable driver research tool, result and exploit PoCs☆224Updated 2 years ago
- A manual PE mapping implementation, aka reflective loader☆19Updated 3 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆121Updated last year
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆155Updated last year
- Small tool to convert beteween the PE alignments (raw and virtual).☆106Updated 2 years ago
- simple user-mode Rootkit☆107Updated 3 years ago
- a small curation of created/stolen scripts for reverse engineering☆12Updated last year
- IDA Python deobfuscation script for ConfuserEx binaries☆35Updated 3 years ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆110Updated 9 months ago
- Binary Ninja plugin to deobfuscate strings obfuscated with the Garble project☆39Updated 8 months ago
- Admin to Kernel code execution using the KSecDD driver☆260Updated last year
- PoC for popping a system shell against the LnvMSRIO.sys driver☆113Updated last month
- UnpacMe IDA Byte Search☆29Updated 2 years ago
- ☆39Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆116Updated 6 months ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆414Updated 2 weeks ago
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆260Updated last year
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆23Updated last year
- LPE exploit for CVE-2023-36802☆24Updated 2 years ago
- ☆188Updated last year
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆357Updated last year
- Get information about stripped rust executables☆37Updated 6 months ago
- ☆114Updated 2 weeks ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆315Updated last year
- Metamorphic engine written in Rust.☆18Updated 3 years ago