Pinned Repositories
.NET-Reflector-Keygen
A keygen for .NET reflector
000exe
The (in)famous 000.exe virus
0x88
0x88 exploit pack Decoded
2018-UEFI-Bootloader
64-Bit-NASM-Assembly-Code-Examples
64 bit nasm code examples
7ev3n_decoders
Decoders for 7ev3n ransomware
adventofcode-2020
https://adventofcode.com/2020
anacrolix
Automatically exported from code.google.com/p/anacrolix
Andro-GotHook
android so 导入表Hook
Crypto-Hash
MASM Crypto Lib
0xFF1E071F's Repositories
0xFF1E071F/Android-RATList
Android - Remote Access Trojan List
0xFF1E071F/AtomLdr
A DLL loader with advanced evasive features
0xFF1E071F/bddisasm
bddisasm is a fast, lightweight, x86/x64 instruction decoder. The project also features a fast, basic, x86/x64 instruction emulator, designed specifically to detect shellcode-like behavior.
0xFF1E071F/Black-Angel-Rootkit
Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.
0xFF1E071F/Blackbone
Windows memory hacking library
0xFF1E071F/BlackLotus
BlackLotus UEFI Windows Bootkit
0xFF1E071F/bobalkkagi
Themida 3.x unpacking, unwrapping and devirtualization(future)
0xFF1E071F/CaveCarver
CaveCarver - PE backdooring tool which utilizes and automates code cave technique
0xFF1E071F/ConfuserExTools
ConfuserEx unpacking tools
0xFF1E071F/direct-syscall
A simple direct syscall wrapper written in C++ with compatibility for x86 and x64 programs.
0xFF1E071F/EDRSandblast
0xFF1E071F/HardHatC2
A C# Command & Control framework
0xFF1E071F/Jlaive_Crypter
🔰 Crypter 100% FUD AntiVirus Evasion | AES-256, XOR Bit Encryption
0xFF1E071F/KDU
Kernel Driver Utility
0xFF1E071F/LightFTP
Small x86-32/x64 FTP Server
0xFF1E071F/ntrugen
0xFF1E071F/PetitPotato
Local privilege escalation via PetitPotam (Abusing impersonate privileges).
0xFF1E071F/ropfuscator
ROPfuscator is a fine-grained code obfuscation framework for C/C++ programs using ROP (return-oriented programming).
0xFF1E071F/systrack
📡🐧 Linux kernel syscall implementation tracker
0xFF1E071F/SysWhispers3
SysWhispers on Steroids - AV/EDR evasion via direct system calls.
0xFF1E071F/Terminator
Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes
0xFF1E071F/themdem
0xFF1E071F/TS-Fucker
TS-Fucker - Forces the machine in/out of TestSigning Mode at runtime.
0xFF1E071F/VMAttack
An automated VM disassembler and devirtualization tool [WIP!]
0xFF1E071F/Windows_LPE_AFD_CVE-2023-21768-xforcered
LPE exploit for CVE-2023-21768
0xFF1E071F/windows_x64_shellcode_template
An easily modifiable shellcode template for Windows x64 written in C
0xFF1E071F/WindowsXPKg
Keygen for Windows XP
0xFF1E071F/WorldConquerGame
A game where you have to hunt secrets in order to conquer land in the real world.
0xFF1E071F/wtf
wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows.
0xFF1E071F/yetAnotherObfuscator
C# obfuscator that bypass windows defender