Xelentra1's Stars
senator715/IDA-Fusion
ULTRA Fast Signature scanner & creator for IDA7 & IDA8+ using GCC
cjm00n/EvilSln
A New Exploitation Technique for Visual Studio Projects
PaddlePaddle/PaddleOCR
Awesome multilingual OCR toolkits based on PaddlePaddle (practical ultra lightweight OCR system, support 80+ languages recognition, provide data annotation and synthesis tools, support training and deployment among server, mobile, embedded and IoT devices)
joshhighet/ransomwatch
the transparent ransomware claim tracker 🥷🏼🧅🖥️
JonathanSalwan/VMProtect-devirtualization
Playing with the VMProtect software protection. Automatic deobfuscation of pure functions using symbolic execution and LLVM.
OP-TEE/optee_os
Trusted side of the TEE
cryptolu/primes-backdoor
Prime backdooring procedure to allow fast factorization of semiprimes
silentsignal/burp-log4shell
Log4Shell scanner for Burp Suite
io12/pwninit
pwninit - automate starting binary exploit challenges
welchbj/ctf
knowledge is power
VenTaz/Themidie
x64dbg plugin to bypass Themida 3.x Anti-Debugger / VM / Monitoring programs checks (x64)
acisoru/ctfcup-21-quals
shsirk/proctracer
INTEL PIN dbi based process tracer
smallkirby/kernelpwn
kernel-pwn and writeup collection
extremecoders-re/pyinstxtractor
PyInstaller Extractor
mike1k/HookHunter
Analyze patches in a process
DarkCoderSc/inno-shellcode-example
Run shellcode through InnoSetup code engine.
JustasMasiulis/inline_syscall
Inline syscalls made easy for windows on clang
alexhude/FRIEND
Flexible Register/Instruction Extender aNd Documentation
danielkrupinski/vac-hooks
Hook WinAPI functions used by Valve Anti-Cheat. Log calls and intercept arguments & return values. DLL written in C.
TheCruZ/kdmapper
KDMapper is a simple tool that exploits iqvw64e.sys Intel driver to manually map non-signed drivers in memory
unprovable/PentestHardware
Kinda useful notes collated together publicly
namazso/IDAShell
Shell extension for opening executables in IDA
Shhoya/Examples
posting example
edygert/runsc
runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is based on the code from https://github.com/Kdr0x/Kd_Shellcode_Loader by Gary "kd" Contreras.
landhb/HideProcess
A basic Direct Kernel Object Manipulation rootkit that removes a process from the EPROCESS list, hiding it from the Task Manager
trailofbits/publications
Publications from Trail of Bits
mrphrazer/hitb2021ams_deobfuscation
rwfpl/rewolf-x86-virtualizer
Simple VM based x86 PE (portable exectuable) protector.
LordNoteworthy/cpu-internals
Intel / AMD CPU Internals