Rootkitsmm-zz's Stars
chakra-core/ChakraCore
ChakraCore is an open source Javascript engine with a C API.
hfiref0x/UACME
Defeating Windows User Account Control
misterch0c/shadowbroker
The Shadow Brokers "Lost In Translation" leak
HJLebbink/asm-dude
Visual Studio extension for assembly syntax highlighting and code completion in assembly files and the disassembly window
raboof/nethogs
Linux 'net top' tool
justcoding121/titanium-web-proxy
A cross-platform asynchronous HTTP(S) proxy server in C#.
googleprojectzero/symboliclink-testing-tools
googlefonts/sfntly
A Library for Using, Editing, and Creating SFNT-based Fonts
subgraph/oz
OZ: a sandboxing system targeting everyday workstation applications
FSecureLABS/win_driver_plugin
A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.
BreakingMalware/PowerLoaderEx
PowerLoaderEx - Advanced Code Injection Technique for x32 / x64
weixu8/pcmonitor
pcmonitor - windows kernel driver to monitor users activity(such as keyboard input, screenshot) and send encrypted reports to mobile applications in realtime through intermediate web server
sch3m4/libntoh
User-friendly C Library to perform TCP streams reassembly and IPv4/6 defragmentation
tandasat/meow
nyā
korczis/libnids
Libnids is an implementation of an E-component of Network Intrusion Detection System. It emulates the IP stack of Linux 2.0.x. Libnids offers IP defragmentation, TCP stream assembly and TCP port scan detection.
Rootkitsmm-zz/MS15-061
Exploiting MS15-061 local Privilege escalation
lpefferkorn/ipdecap
Decapsulate traffic encapsulated within GRE, IPIP, 6in4, ESP (ipsec) protocols, can also remove IEEE 802.1Q (virtual lan) header. Works with pcap files.
n3k/CansecWest2016_Getting_Physical
CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems
molnarg/cve-2014-0521