Pinned Repositories
Atom_bombing
Commented version of Atom_bombing injection technique. Original source code from https://blog.ensilo.com/atombombing-brand-new-code-injection-for-windows
Carberp
Carberp Banking Trojan
CreateProcess
A simple C++ app to demo the use of CreateProcess() ,WaitForSingleObject() and use of handles.
DanSpecial
Weaponizing Gigabyte driver for priv escalation and bypass PPL
DrvMon
Advanced driver monitoring utility.
FileTest
Source code for File Test - Interactive File System Test Tool
malware-source-nanomites
NtCreateUserProcess_
peta909's Repositories
peta909/malware-source-nanomites
peta909/advisories
Security advisories
peta909/aggr-inject
Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.
peta909/anticuckoo
A tool to detect and crash Cuckoo Sandbox
peta909/Apktool
A tool for reverse engineering Android apk files
peta909/Ark-tools
Windows Ark 工具的工程和一些demo
peta909/broken_abandoned
Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series
peta909/bugs
public bugs/proof of concepts
peta909/chipsec
Platform Security Assessment Framework
peta909/ComProgramBook
peta909/CVE-2015-6620-POC
POC for CVE-2015-6620, AMessage unmarshal arbitrary write
peta909/EvilAbigail
Automated Linux evil maid attack
peta909/jtagsploitation
scripts and examples for using JTAG debug tools to gain root access
peta909/lte
lte security
peta909/MalwareFragmentationTool
Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for people who do malware research or analysis for pe_files
peta909/MoRE
TLB splitting VMM
peta909/movfuscator
The single instruction C compiler
peta909/opensource_taig
Lets create an open source version of the latest TaiG jailbreak.
peta909/poet
Post-exploitation tool
peta909/Publications
Conference slides and White-papers
peta909/SAVIORBURST
SAVIORBURST
peta909/shadow
A new, extended (and renamed ;) version of the Firefox/jemalloc heap exploitation swiss army knife
peta909/Smashing_The_Browser
Smashing The Browser: From Vulnerability Discovery To Exploit
peta909/stfusip
System Integrity Protection (SIP) bypass for OSX 10.11.1
peta909/uefireverse
Tools to help with Reverse Engineering UEFI-based firmware
peta909/uroboros
peta909/vba-dynamic-hook
VBA Dynamic Hook dynamically analyzes VBA macros inside Office documents by hooking function calls
peta909/virtdbg
Automatically exported from code.google.com/p/virtdbg
peta909/write-ups-2015
Wiki-like CTF write-ups repository, maintained by the community. 2015
peta909/ZDI-15-639
Proof of Concept for ZDI-15-639