KaleBBuR
Student interested in Cybersecurity, Windows Internals, Binary Exploitation, UEFI and Reverse Engineering
Dallas, TX
KaleBBuR's Stars
Live-CTF/LiveCTF-DEFCON30
hackerhouse-opensource/MsSettingsDelegateExecute
Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.
nomi-sec/PoC-in-GitHub
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
k0keoyo/HEVD-Arbitrary-Overwrite-Exploit-Win10-rs3
0xcpu/ExecutiveCallbackObjects
Research on Windows Kernel Executive Callback Objects
thesecretclub/SandboxBootkit
Bootkit for Windows Sandbox to disable DSE/PatchGuard.
binarly-io/fwhunt-scan
Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules
Mattiwatti/EfiGuard
Disable PatchGuard and Driver Signature Enforcement at boot time
ExpLife0011/anti-anti-vm-detection-dll-1
1111joe1111/tuts
Reverse engineering tutorials
OpenToAllCTF/REsources
Reverse Engineering Resources
onethawt/reverseengineering-reading-list
A list of Reverse Engineering articles, books, and papers
keystone-engine/keypatch
Multi-architecture assembler for IDA Pro. Powered by Keystone Engine.
waryas/KACE
Emulate Drivers in RING3 with self context mapping or unicorn
mathisvickie/KMAC
Some usefull info when reverse engineering Kernel Mode Anti-Cheat
j00ru/ctf-tasks
An archive of low-level CTF challenges developed over the years
mq1n/NoMercy
Open source anti cheat
matthieu-hackwitharts/Win32_Offensive_Cheatsheet
Win32 and Kernel abusing techniques for pentesters
ionescu007/VisualUefi
A project for allowing EDK-II Development with Visual Studio
btbd/umap
UEFI bootkit for driver manual mapping
0x6d69636b/windows_hardening
HardeningKitty and Windows Hardening Settings
KiFilterFiberContext/BadlionLogger
kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT
onethawt/idaplugins-list
A list of IDA Plugins
jonomango/hv
Lightweight Intel VT-x Hypervisor.
yardenshafir/IoRingReadWritePrimitive
Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2
repnz/practical-reverse-engineering
Code for the solutions of practical reverse engineering
bysideen/eBook-1
WithSecureLabs/CallStackSpoofer
A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)
alal4465/Practical-Reverse-Engineering-Solutions
Some drivers I've written while solving exercises from Practical Reverse Engineering
ExpLife0011/CVE-2019-0803
Win32k Elevation of Privilege Poc