BlackHat-Ashura
Security Researcher with experience in Reverse Engineering, Malware Development, Vulnerability Research & Exploit Development, Active Directory Pentesting
Corrupting ╗#### Kernel Memory ####
Pinned Repositories
Buffer_Overflows_Tools
Group of tools to aid in performing Buffer Overflows.
Inject-Hook-Unhook_POC
POC demonstrating DLL Injection, API Hooking and API Unhooking.
Named_Pipe_Reverse_Shell
This is a reverse shell for windows that uses Named Pipes for communication.
PNG_StegTool
Hide and Unhide message in and from brightness values of PNG format image.
Process_Doppelganging
A malware technique that makes use of NTFS transactions to create a process that is not backed by a malicious file
Process_Ghosting
Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by a file. This is an evasion technique.
Process_Hollowing
Process Hollowing is a process injection technique in which a process is created in a suspended state and its contents are replaced with the contents of another binary.
Reflective_DLL_Injection
Program to Inject a DLL into a process from memory.
Reflective_PE_Loader
Program to load a PE inside memory on another process.
Space_StegTool
Encode/Decode message To/From Spaces and Tabs
BlackHat-Ashura's Repositories
BlackHat-Ashura/Process_Ghosting
Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by a file. This is an evasion technique.
BlackHat-Ashura/Reflective_DLL_Injection
Program to Inject a DLL into a process from memory.
BlackHat-Ashura/Reflective_PE_Loader
Program to load a PE inside memory on another process.
BlackHat-Ashura/Inject-Hook-Unhook_POC
POC demonstrating DLL Injection, API Hooking and API Unhooking.
BlackHat-Ashura/Process_Hollowing
Process Hollowing is a process injection technique in which a process is created in a suspended state and its contents are replaced with the contents of another binary.
BlackHat-Ashura/Process_Doppelganging
A malware technique that makes use of NTFS transactions to create a process that is not backed by a malicious file
BlackHat-Ashura/Buffer_Overflows_Tools
Group of tools to aid in performing Buffer Overflows.
BlackHat-Ashura/Named_Pipe_Reverse_Shell
This is a reverse shell for windows that uses Named Pipes for communication.
BlackHat-Ashura/PNG_StegTool
Hide and Unhide message in and from brightness values of PNG format image.
BlackHat-Ashura/Space_StegTool
Encode/Decode message To/From Spaces and Tabs
BlackHat-Ashura/Data-Structures-And-Algorithms
Data Structures And Algorithms In Python
BlackHat-Ashura/Exploit_Development_Practice
Exploit Development Journey
BlackHat-Ashura/Hackerrank-Solutions