sysopfb / VM_Timing_DetectLinks
☆13Updated 8 years ago
Alternatives and similar repositories for VM_Timing_Detect
Users that are interested in VM_Timing_Detect are comparing it to the libraries listed below
Sorting:
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆38Updated 9 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- ☆45Updated 7 years ago
- Experimental Windows .text section Patch Detector☆21Updated 10 years ago
- Ring3 Rootkit Backdoor.☆42Updated 9 years ago
- ☆52Updated 8 years ago
- ☆14Updated 7 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 8 years ago
- Scripts targeting specific families☆13Updated 8 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 10 years ago
- Win32k Elevation of Privilege Poc☆1Updated 6 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Updated 8 years ago
- API Tracker by Cysinfo Team☆22Updated 8 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- ☆28Updated 8 years ago
- ☆36Updated 5 years ago
- UAC 0Day all day!☆57Updated 7 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- ☆22Updated 8 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago
- Experimental: Windows .text section compare - disk versus memory☆14Updated 10 years ago
- Notes about reverse engineering the Petya2017 ransomware☆18Updated 8 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 6 years ago