thass0 / blog-codeLinks
Code used in blog posts
☆34Updated 6 months ago
Alternatives and similar repositories for blog-code
Users that are interested in blog-code are comparing it to the libraries listed below
Sorting:
- A tasty cross-platform tool from Blacksea to debug shellcode!☆92Updated 2 years ago
- A library for intercepting system calls☆104Updated 10 months ago
- Microsoft Developer Blogs Search Tool☆24Updated 6 months ago
- Some security by obscurity using port-jumping.☆14Updated 2 months ago
- Kernel module that allows hiding files in any filesystem☆22Updated 10 months ago
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆67Updated 8 months ago
- Network Traffic Fuzzer☆18Updated 10 months ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆121Updated 3 weeks ago
- Z Anti-Anti-Debugger for Linux☆55Updated 3 months ago
- Utility to find hidden Linux kernel modules☆146Updated 3 months ago
- A network forensics and passive sniffer tool☆49Updated last week
- ☆16Updated 3 years ago
- rpv is a v library for analyzing RPC servers and interfaces on the Windows operating system☆36Updated 6 months ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆42Updated last year
- x86 Real-Mode MS-DOS Emulator using Windows Hypervisor Platform☆142Updated last year
- ☆25Updated last year
- ☆70Updated 2 years ago
- ☆31Updated 8 months ago
- Intel 64/Windows low-level experiments☆62Updated 2 months ago
- A slightly more fun way to disable windows defender☆47Updated 6 months ago
- iTLB multihit PoC☆42Updated 2 years ago
- curiosity got me here☆43Updated last year
- Web based binary analysis☆86Updated 11 months ago
- Yandex browser password recovery☆11Updated 7 months ago
- Worldline Yomani XR Flash Unpacker https://stefan-gloor.ch/yomani-hack☆46Updated last year
- Proof-of-concept modular implant platform leveraging v8☆56Updated 8 months ago
- A feed of malware samples curated from threat intelligence sources.☆28Updated 2 years ago
- Userland exec PoC to be used as attack vector technique☆94Updated 3 weeks ago
- In-Memory Rootkit For Linux and BSD☆86Updated 3 months ago