peta909's Stars
ytdl-org/youtube-dl
Command-line program to download videos from YouTube.com and other video sites
google/clusterfuzz
Scalable fuzzing infrastructure.
trailofbits/manticore
Symbolic execution tool
sbousseaden/EVTX-ATTACK-SAMPLES
Windows Events Attack Samples
yeyintminthuhtut/Awesome-Advanced-Windows-Exploitation-References
List of Awesome Advanced Windows Exploitation References
FuzzySecurity/Sharp-Suite
Also known by Microsoft as Knifecoat :hot_pepper:
NYAN-x-CAT/Lime-RAT
LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)
wbenny/pdbex
pdbex is a utility for reconstructing structures and unions from the PDB into compilable C headers
niemand-sec/AntiCheat-Testing-Framework
Framework to test any Anti-Cheat
OALabs/BlobRunner
Quickly debug shellcode extracted during malware analysis
unprovable/PentestHardware
Kinda useful notes collated together publicly
felixweyne/imaginaryC2
Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which captures HTTP requests towards selectively chosen domains/IPs. Additionally, the tool aims to make it easy to replay captured Command-and-Control responses/served payloads.
patois/HRDevHelper
HexRays ctree visualization plugin
therealdreg/anticuckoo
A tool to detect and crash Cuckoo Sandbox
felixweyne/ProcessSpawnControl
Process Spawn Control is a Powershell tool which aims to help in the behavioral (process) analysis of malware. PsC suspends newly launched processes, and gives the analyst the option to either keep the process suspended, or to resume it.
SinaKarvandi/Process-Magics
This is a collection of interesting codes about Windows Process creation.
v-p-b/avpwn
List of real-world threats against endpoint protection software
IAIK/sgxrop
The code to the SGX-ROP paper
hfiref0x/VMDE
Source from VMDE paper, adapted to 2015
josh0xA/threadfire
PoC Thread Execution Hijacking for Win32 Code Injection
ernw/Windows-Insight
The content of this repository aims to assist efforts on analysing inner working principles, functionalities, and properties of the Microsoft Windows operating system. This repository stores relevant documentation as well as executable files needed for conducting analysis studies.
eset/vba-dynamic-hook
VBA Dynamic Hook dynamically analyzes VBA macros inside Office documents by hooking function calls
sevagas/WindowsDefender_ASR_Bypass-OffensiveCon2019
Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.
zodiacon/GflagsX
Enhanced version of the GFlags tool
SouhailHammou/KernelSymbolsHelper
Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using the symbol server.
Fare9/PBA_Analysis_Tools
My own versions from the programs of the book "Practical Binary Analysis"
wildcardc/cfxc-deobf
A ConfuserEx-custom deobfuscation toolchain
Varbin/xtea
A python version of XTEA
JeremyBlackthorne/PE-Runtime-Data-Structures
peta909/DanSpecial
Weaponizing Gigabyte driver for priv escalation and bypass PPL