Pinned Repositories
al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
AutoTouch
android 模拟屏幕点击。利用无障碍服务,并申请悬浮窗权限,全屏点击记录触控点,并定时重复模拟点击。
awsay-game-helper
介绍入门级游戏辅助的原理,内附有2018年2月dnf辅助C++源码
bilibili-API-collect
哔哩哔哩-API收集整理【不断更新中....】
capstone
Capstone disassembly/disassembler framework: Core (Arm, Arm64, BPF, EVM, M68K, M680X, MOS65xx, Mips, PPC, RISCV, Sparc, SystemZ, TMS320C64x, Web Assembly, X86, X86_64, XCore) + bindings.
DllToShellCode
Fast Conversion Windows Dynamic Link Library To ShellCode
HideDriver
之前那份是7600的,每次编译搞得好麻烦。更新一个VS2017可以直接编译的。
picture-merge
Poseidon
stealthy UM <-> KM communication system without creating any system threads, permanent hooks, driver objects, section objects or device objects.
puppeteer-extra-plugins-stealth
moxiaolongx0's Repositories
moxiaolongx0/awsay-game-helper
介绍入门级游戏辅助的原理,内附有2018年2月dnf辅助C++源码
moxiaolongx0/picture-merge
moxiaolongx0/al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
moxiaolongx0/AutoTouch
android 模拟屏幕点击。利用无障碍服务,并申请悬浮窗权限,全屏点击记录触控点,并定时重复模拟点击。
moxiaolongx0/bilibili-API-collect
哔哩哔哩-API收集整理【不断更新中....】
moxiaolongx0/capstone
Capstone disassembly/disassembler framework: Core (Arm, Arm64, BPF, EVM, M68K, M680X, MOS65xx, Mips, PPC, RISCV, Sparc, SystemZ, TMS320C64x, Web Assembly, X86, X86_64, XCore) + bindings.
moxiaolongx0/DllToShellCode
Fast Conversion Windows Dynamic Link Library To ShellCode
moxiaolongx0/HideDriver
之前那份是7600的,每次编译搞得好麻烦。更新一个VS2017可以直接编译的。
moxiaolongx0/Poseidon
stealthy UM <-> KM communication system without creating any system threads, permanent hooks, driver objects, section objects or device objects.
moxiaolongx0/puppeteer-extra-plugins-stealth
moxiaolongx0/stock
stock股票.获取股票数据,计算股票指标,识别股票形态,综合选股,选股策略,股票验证回测,股票自动交易,支持PC及移动设备。
moxiaolongx0/TDL
Driver loader for bypassing Windows x64 Driver Signature Enforcement
moxiaolongx0/TinyVT
轻量级VT框架和Ept无痕HOOK,测试环境:WIN10 1903,WIN7