Pinned Repositories
awesome-windows-kernel-security-development
windows kernel security development
BetaZ
chia-khoa-thanh-cong-fpt
Học thật thi thật - chìa khóa thành công fpt
Cobalt4.4
Cobalt Strike 4.4 Full cracked
evkey
game-reversing
Beginner learning materials on how to reverse engineer video games
hooking-by-example
A series of increasingly complex programs demonstrating function hooking on 64 bit Windows. Culminating in a program that hooks mspaint to make it always paint orange.
iDA_PRO_7.6
CRACKED VERSION OF IDA PRO 7.6 DOWNLOAD NOWWWWWWWWWWWWWWWWWWWWWWWWW
IDA_Pro_7.7
Imgui_Sample
Simple ImGUI with D3D9
c0sette's Repositories
c0sette/Cobalt4.4
Cobalt Strike 4.4 Full cracked
c0sette/iDA_PRO_7.6
CRACKED VERSION OF IDA PRO 7.6 DOWNLOAD NOWWWWWWWWWWWWWWWWWWWWWWWWW
c0sette/game-reversing
Beginner learning materials on how to reverse engineer video games
c0sette/awesome-windows-kernel-security-development
windows kernel security development
c0sette/BetaZ
c0sette/chia-khoa-thanh-cong-fpt
Học thật thi thật - chìa khóa thành công fpt
c0sette/evkey
c0sette/hooking-by-example
A series of increasingly complex programs demonstrating function hooking on 64 bit Windows. Culminating in a program that hooks mspaint to make it always paint orange.
c0sette/IDA_Pro_7.7
c0sette/Imgui_Sample
Simple ImGUI with D3D9
c0sette/injection
Windows process injection methods
c0sette/Kernel-VAD-Injector
Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver
c0sette/Kernelhub
:palm_tree:Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (Windows提权漏洞合集)
c0sette/libDetour
Microsoft Detour 4.0 build
c0sette/lucid
An Interactive Hex-Rays Microcode Explorer
c0sette/mouse-tooltip
c0sette/PacketDumper
A simple Microsoft detour based packet logging DLL written using C++
c0sette/regconize-ques
c0sette/reverse-engineering-and-malware-analysis
Course content and slides from my ancient training on Reverse Engineering & Malware Analysis
c0sette/sample
c0sette/sharem
SHAREM is a shellcode analysis framework, capable of emulating more than 12,000 WinAPIs and virutally all Windows syscalls. It also contains its own custom disassembler, with many innovative features, such as being able to show the deobfuscated disassembly of an encoded shellcode, or integrating emulation data to enhance the disassembly.
c0sette/Un_KB