zodiacon / Recon2023Links
Recon 2023 slides and code
☆80Updated 2 years ago
Alternatives and similar repositories for Recon2023
Users that are interested in Recon2023 are comparing it to the libraries listed below
Sorting:
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆120Updated last year
- ☆114Updated this week
- Code samples that serve as references for Windows API functions☆73Updated last year
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆126Updated 2 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 8 months ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- ☆21Updated 2 years ago
- ☆74Updated last year
- ☆105Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆117Updated last year
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆118Updated 2 years ago
- ☆97Updated 3 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆114Updated 2 years ago
- Winbindex bot to pull in binaries for specific releases☆48Updated 2 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆124Updated 9 months ago
- ☆39Updated 11 months ago
- Windows APT Warfare, published by Packt☆76Updated 2 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆36Updated 2 years ago
- Contains all the applications developed for the Second part of the 7th Edition of Windows Internals book☆114Updated last year
- ☆72Updated 2 years ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆159Updated last month
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 8 months ago
- ☆51Updated 7 months ago
- Windows x64 kernel mode rootkit process hollowing POC.☆189Updated 2 years ago
- C# Utilities for Windows Notification Facility☆159Updated 7 months ago
- Exploitable drivers, you know what I mean☆153Updated last month
- My notes while studying Windows exploitation☆191Updated 2 years ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆132Updated this week
- ☆60Updated 6 months ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆33Updated 6 years ago