Blog posts
☆29Aug 7, 2020Updated 5 years ago
Alternatives and similar repositories for Blog
Users that are interested in Blog are comparing it to the libraries listed below
Sorting:
- ☆12Jul 27, 2020Updated 5 years ago
- NDC Oslo 2019 slides and demos☆33Nov 26, 2020Updated 5 years ago
- Demos and presentation from SECArmy Village Grayhat 2020☆37Mar 15, 2023Updated 2 years ago
- collection of links related to using and improving windbg☆20Jun 17, 2018Updated 7 years ago
- 逆向小红伞杀毒软件驱动——avdevprot☆24Dec 3, 2017Updated 8 years ago
- hooking KiUserApcDispatcher☆27Apr 3, 2017Updated 8 years ago
- ☆69Mar 3, 2022Updated 3 years ago
- ☆130Aug 23, 2022Updated 3 years ago
- BITS Transfers Manager☆46May 18, 2025Updated 9 months ago
- ☆30Sep 5, 2025Updated 5 months ago
- Windows Server 2K3 NT 5☆12Apr 14, 2021Updated 4 years ago
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- ☆12Dec 31, 2025Updated 2 months ago
- Assembly code to use for Windows kernel shellcode to edit winlogon.exe ACL☆13Mar 6, 2017Updated 8 years ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Apr 20, 2021Updated 4 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- executing JS from x86 code☆27May 9, 2019Updated 6 years ago
- ☆26Sep 29, 2022Updated 3 years ago
- ☆14Oct 5, 2019Updated 6 years ago
- Book's Example Code☆10Aug 31, 2015Updated 10 years ago
- general framework for creating robots, worms, and backdoors☆11Nov 13, 2017Updated 8 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 8 years ago
- Monitor activity of any driver☆353Nov 2, 2020Updated 5 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆22Jan 13, 2018Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 8 years ago
- 模拟NtTerminateProcess的实现关闭PCHunter☆15Mar 25, 2018Updated 7 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- API Set Viewer☆91Jan 20, 2025Updated last year
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆30Jul 12, 2021Updated 4 years ago
- ☆14May 1, 2021Updated 4 years ago
- ☆14Mar 8, 2019Updated 6 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- bypass CRC☆12May 3, 2018Updated 7 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- The exploit for Panda AV LPE☆37May 22, 2019Updated 6 years ago
- CPU Stress v3.0☆40Feb 5, 2024Updated 2 years ago
- POC viruses I have created to demo some ideas☆59Apr 12, 2020Updated 5 years ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆37Oct 21, 2020Updated 5 years ago