Pinned Repositories
commando-vm
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandiant.com
CVE-2023-23397-POC-Powershell
CVE-2023-23397_EXPLOIT_0DAY
Exploit for the CVE-2023-23397
ew
内网穿透(跨平台)
hollows_hunter
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
l0yuee.github.io
lzeroyuee's blog
MyDebuger
一个调试器的demo
MyKernelHunter
学习内核的一个小demo
NotesOn51asm
学习时的笔记
RemoteControl
基于Qt5的远控
l0yuee's Repositories
l0yuee/NotesOn51asm
学习时的笔记
l0yuee/RemoteControl
基于Qt5的远控
l0yuee/MyDebuger
一个调试器的demo
l0yuee/MyKernelHunter
学习内核的一个小demo
l0yuee/signature-base
Signature base for my scanner tools
l0yuee/commando-vm
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandiant.com
l0yuee/CVE-2023-23397-POC-Powershell
l0yuee/CVE-2023-23397_EXPLOIT_0DAY
Exploit for the CVE-2023-23397
l0yuee/ew
内网穿透(跨平台)
l0yuee/hollows_hunter
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
l0yuee/l0yuee.github.io
lzeroyuee's blog
l0yuee/MyCAD
一个非常简易的CAD画图工具
l0yuee/MyFiles
我的一些配置文件和脚本
l0yuee/MyRE
用于存放一些样本分析文档
l0yuee/rules
Repository of yara rules
l0yuee/shadowbroker
The Shadow Brokers "Lost In Translation" leak
l0yuee/sliver
Adversary Emulation Framework
l0yuee/Terminator
Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes
l0yuee/test
test
l0yuee/unpy2exe
Extract .pyc files from executables created with py2exe
l0yuee/VmWareThrough