lw8192's Stars
secdev/scapy
Scapy: the Python-based interactive packet manipulation program & library.
TheWover/donut
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
JKornev/hidden
🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc
swisskyrepo/InternalAllTheThings
Active Directory and Internal Pentest Cheatsheets
Washi1337/AsmResolver
A library for creating, reading and editing PE files and .NET modules.
lunixbochs/patchkit
binary patching from Python
Dec0ne/DllNotificationInjection
A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and remote processes.
akamai/akamai-security-research
This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.
pr0cf5/kernel-exploit-practice
repository for kernel exploit practice
Maldev-Academy/EntropyReducer
Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists
memN0ps/venom-rs
Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)
czs108/Windows-PE-Packer
🗜️ A packer for Windows x86 executable files written in C and Intel x86 Assembly. The new file after packing can obstruct reverse engineering.
CognisysGroup/HadesLdr
Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2
floesen/KExecDD
Admin to Kernel code execution using the KSecDD driver
Enelg52/KittyStager
KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this project is to be able to have a web server and some kitten and be able to use the with any shellcode.
Nassim-Asrir/CVE-2023-36424
Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation
hugsy/pwn--
pwn++ is a Windows & Linux library oriented for exploit dev but mostly used to play with modern C++ features (17->26)
changeofpace/PE-Header-Dump-Utilities
This x64dbg plugin adds several commands for dumping PE header information by address.
cocomelonc/bsprishtina-2024-maldev-workshop
BSides Prishtina 2024 Malware Development and Persistence workshop
shaygitub/windows-rootkit
windows rootkit
fallingleavesz/OSCP-Playbook-and-Tools
My playbook and Tools used for OSCP Exam
mrtouch93/OSED-Notes
Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.
SilverPlate3/GoodKit
Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity
marche147/pepatch
A hacky tool to patch PE binaries.
rapid7/rex-exploitation
Rex library for various exploitation helpers
mobdk/NewShell
Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode
klecko/Rootkit
Let's try to create a rootkit!
ricardojoserf/vulnserver-exploits
Vulnserver exploits
nicholasmckinney/nutex
An unpacker for out-of-the-box usage of popular shellcode "compiled" packers
Ohjurot/MultiThreadTutorial
YouTube MT Tutorial