Pinned Repositories
.NET-Obfuscator
Lists of .NET Obfuscator (Free, Freemium, Paid and Open Source )
angr
A powerful and user-friendly binary analysis platform!
awesome-reversing
A curated list of awesome reversing resources
awesome-vm-exploit
share some useful archives about vm and qemu escape exploit.
BestEdrOfTheMarket
Little AV/EDR bypassing lab for training & learning purposes
bindiff
Quickly find differences and similarities in disassembled code
C00K13SX
Config files for my GitHub profile.
C00K13SX.github.io
c_std
Implementation of C++ standard libraries in C
cfr
This is the public repository for the CFR Java decompiler
C00K13SX's Repositories
C00K13SX/angr
A powerful and user-friendly binary analysis platform!
C00K13SX/bindiff
Quickly find differences and similarities in disassembled code
C00K13SX/c_std
Implementation of C++ standard libraries in C
C00K13SX/CsWhispers
Source generator to add D/Invoke and indirect syscall methods to a C# project.
C00K13SX/CVE-2023-36003-POC
Privilege escalation using the XAML diagnostics API (CVE-2023-36003)
C00K13SX/CVE-2024-21305
Report and exploit of CVE-2024-21305.
C00K13SX/EventLogCrasher
C00K13SX/excelCPU
16-bit CPU for Excel, and related files
C00K13SX/flare-floss
FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
C00K13SX/ghidra
Ghidra is a software reverse engineering (SRE) framework
C00K13SX/Harmony
A library for patching, replacing and decorating .NET and Mono methods during runtime
C00K13SX/hashdb
Assortment of hashing algorithms used in malware
C00K13SX/ImHex
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
C00K13SX/llvm-yx-callobfuscator
LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.
C00K13SX/Mobile-Security-Framework-MobSF
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
C00K13SX/msmailprobe2
Office 365 and Exchange Enumeration Version 2
C00K13SX/Nidhogg
Nidhogg is an all-in-one simple to use rootkit.
C00K13SX/QuickAsm
C00K13SX/radare2
UNIX-like reverse engineering framework and command-line toolset
C00K13SX/raddebugger
A native, user-mode, multi-process, graphical debugger.
C00K13SX/rehex
Reverse Engineers' Hex Editor
C00K13SX/rizin
UNIX-like reverse engineering framework and command-line toolset.
C00K13SX/rust-malware-gallery
A collection of malware families and malware samples which use the Rust programming language.
C00K13SX/Stardust
A modern 64-bit position independent implant template
C00K13SX/SyscallMeMaybe
Implementation of Indirect Syscall technique to pop a calc.exe
C00K13SX/ThievingFox
C00K13SX/Thread-Pool-Injection-PoC
Proof of concept code for thread pool based process injection in Windows.
C00K13SX/upx
UPX - the Ultimate Packer for eXecutables
C00K13SX/x64dbg
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
C00K13SX/XLL-DROPPER-
XLL DROPPER | Learn to create Native xll Dropper