thecatenjoyer / singlestep_xorstubLinks
Stub for polymorphic code
☆11Updated 2 years ago
Alternatives and similar repositories for singlestep_xorstub
Users that are interested in singlestep_xorstub are comparing it to the libraries listed below
Sorting:
- Intel 64/Windows low-level experiments☆63Updated 5 months ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆43Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- ☆20Updated 5 years ago
- ☆31Updated 11 months ago
- A few examples of how to trap virtual memory access on Windows.☆39Updated last year
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated 2 years ago
- Native Powers Talk demos☆15Updated this week
- ☆35Updated 2 years ago
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆130Updated last month
- API Hammering with C++20☆49Updated 3 years ago
- really ?☆12Updated last year
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Updated 2 years ago
- ☆31Updated last year
- some AV / EDR / analysis studies☆10Updated 2 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 11 months ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Updated 3 years ago
- ☆10Updated 3 years ago
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Updated 3 months ago
- ☆25Updated last year
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆53Updated 7 months ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115Updated 2 years ago
- A more reliable way of resolving syscall numbers in Windows☆54Updated last year
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆17Updated last year
- Piece of code to detect and remove hooks in IAT☆65Updated 3 years ago
- Linux Sleep Obfuscation☆107Updated 2 years ago
- ☆38Updated 2 years ago
- ☆89Updated last year
- CVE-2018-6066 using VBA☆68Updated 3 years ago