thass0 / blog-codeLinks
Code used in blog posts
☆34Updated 8 months ago
Alternatives and similar repositories for blog-code
Users that are interested in blog-code are comparing it to the libraries listed below
Sorting:
- A library for intercepting system calls☆103Updated last year
- A tasty cross-platform tool from Blacksea to debug shellcode!☆92Updated 2 years ago
- Microsoft Developer Blogs Search Tool☆25Updated 9 months ago
- Network Traffic Fuzzer☆17Updated last year
- ☆16Updated 4 years ago
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆124Updated 3 months ago
- Kernel module that allows hiding files in any filesystem☆23Updated last year
- ☆25Updated 2 years ago
- Z Anti-Anti-Debugger for Linux☆59Updated 6 months ago
- Some security by obscurity using port-jumping.☆14Updated 5 months ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆45Updated last year
- Utility to find hidden Linux kernel modules☆146Updated 6 months ago
- A feed of malware samples curated from threat intelligence sources.☆28Updated 2 years ago
- rpv is a v library for analyzing RPC servers and interfaces on the Windows operating system☆37Updated 2 months ago
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆75Updated 10 months ago
- NES emulator written in C/C++ using pure WinAPI☆119Updated last year
- ☆31Updated 11 months ago
- curiosity got me here☆45Updated last year
- A simple In memory file system written in C☆39Updated 10 months ago
- In-Memory Rootkit For Linux and BSD☆87Updated 5 months ago
- Worldline Yomani XR Flash Unpacker https://stefan-gloor.ch/yomani-hack☆46Updated last year
- rpv-web is a browser based frontend for the rpv library☆26Updated 2 months ago
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆59Updated last year
- ugly code to check linux kernel memory and dump some internal structures☆48Updated last year
- A guide to get you started with Windows Kernel Debugging walking you through the complete setup and usage of WinDbg to trace Windows proc…☆25Updated 2 months ago
- Silly proof-of-concept for a PDF chatroom☆20Updated 2 years ago
- ☆16Updated last year
- A YARA rule generator☆60Updated 3 weeks ago
- CTF Challenge for CSAW Finals 2021☆13Updated 4 years ago
- Userland exec PoC to be used as attack vector technique☆94Updated 3 months ago