tmpout / Resources
☆12Updated last year
Alternatives and similar repositories for Resources:
Users that are interested in Resources are comparing it to the libraries listed below
- Binary Golf Library☆62Updated 3 years ago
- ☆88Updated last month
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆54Updated 2 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated 3 weeks ago
- Binary Golf Grand Prix☆53Updated 2 weeks ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆28Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆54Updated 3 months ago
- A collection of my reverse engineering and malware analysis write-ups☆20Updated 4 years ago
- yet another hidden LKM hunter☆20Updated last year
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆26Updated 3 years ago
- ☆17Updated 4 years ago
- Collection of codes focused on Linux rootkits☆95Updated last month
- Protocol Reverse Engineering Resources☆20Updated last year
- Anti-reverse Compilation☆33Updated 4 years ago
- Userland exec PoC to be used as attack vector technique☆82Updated 2 months ago
- iTLB multihit PoC☆40Updated last year
- ☆49Updated 6 years ago
- A feed of malware samples curated from threat intelligence sources.☆25Updated last year
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆114Updated 11 months ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆62Updated 3 years ago
- short crackme for Windows XP SP3 (32 bit version). ring0 stuff. IMO very fun x-)☆23Updated last year
- Proof-of-concept modular implant platform leveraging v8☆51Updated 3 weeks ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆20Updated 2 weeks ago
- ☆17Updated 10 months ago
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆45Updated 10 months ago
- ☆28Updated 3 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆52Updated 3 months ago