Pinned Repositories
RE-MA-Roadmap
Reverse Engineering and Malware Analysis Roadmap
ROPme
Windows Exploit development : Bypass Data Execution Prevention (DEP) using ROP chains manually hard code
Stuxnet-Rootkit
Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis
APTX4869
The Never-Ending Hide and Seek: The Tale of APTX4869 Rootkit
pegasus-JB-PoC
Pegasus exploit port to iOS
azureOutlookC2
Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP: Use Microsoft Graph API for C2 Operations.
Inline_Hooking
Let's dive deeper into some key aspects of Inline Hooking in C++
APTX4869-Rootkit
APTX4869 Rootkit is a Kernel Mode Rootkit
Hooking-Detours
Hooking Malware API with Detours Library
OrcaGetProcAddr
list of all currently executing processes in the system
ring0-c0d3-br34k3r's Repositories
ring0-c0d3-br34k3r/VBABreach
This script is designed to breach security measures within Microsoft Word, leveraging VBA macros to execute commands.
ring0-c0d3-br34k3r/Mobile-Security-Framework-MobSF
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
ring0-c0d3-br34k3r/APTX4869
The Never-Ending Hide and Seek: The Tale of APTX4869 Rootkit
ring0-c0d3-br34k3r/OrcaGetProcAddr
list of all currently executing processes in the system
ring0-c0d3-br34k3r/Stuxnet-Rootkit
Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis
ring0-c0d3-br34k3r/cve
Gather and update all available and newest CVEs with their PoC.
ring0-c0d3-br34k3r/0xp17j8
ring0-c0d3-br34k3r/ROPme
Windows Exploit development : Bypass Data Execution Prevention (DEP) using ROP chains manually hard code
ring0-c0d3-br34k3r/APT_REPORTS
Interesting APT Report Collection And Some Special IOC
ring0-c0d3-br34k3r/pwn--
pwn++ is a Windows & Linux library oriented for exploit dev but mostly used to play with modern C++ features (17->26)
ring0-c0d3-br34k3r/kit
ring0-c0d3-br34k3r/RE-MA-Roadmap
Reverse Engineering and Malware Analysis Roadmap
ring0-c0d3-br34k3r/SignatureSlip
Windows driver manipulation program to disable Driver Signature Enforcement (DSE)
ring0-c0d3-br34k3r/SignatureStriker
Disables the Driver Signature Enforcement (DSE) for a Specific Driver
ring0-c0d3-br34k3r/Havoc
The Havoc Framework.
ring0-c0d3-br34k3r/data
APTnotes data
ring0-c0d3-br34k3r/APT_CyberCriminal_Campagin_Collections
APT & CyberCriminal Campaign Collection
ring0-c0d3-br34k3r/cave_miner
Search for code cave in all binaries
ring0-c0d3-br34k3r/VX-API
Collection of various malicious functionality to aid in malware development
ring0-c0d3-br34k3r/awesome-ml-for-cybersecurity
:octocat: Machine Learning for Cyber Security
ring0-c0d3-br34k3r/APTX4869-Rootkit
APTX4869 Rootkit is a Kernel Mode Rootkit
ring0-c0d3-br34k3r/Inline_Hooking
Let's dive deeper into some key aspects of Inline Hooking in C++
ring0-c0d3-br34k3r/Rootkit_Hooking
In order to make more people know about the techniques used by rootkits to intercept function calls
ring0-c0d3-br34k3r/Hooking-Detours
Hooking Malware API with Detours Library
ring0-c0d3-br34k3r/APTnotes
Various public documents, whitepapers and articles about APT campaigns
ring0-c0d3-br34k3r/nso
ring0-c0d3-br34k3r/MyDocs
各种乱七八糟的收集, 51pwn.com大数据平台模糊查询
ring0-c0d3-br34k3r/Apt_t00ls
高危漏洞利用工具
ring0-c0d3-br34k3r/azureOutlookC2
Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP: Use Microsoft Graph API for C2 Operations.
ring0-c0d3-br34k3r/manjusaka
牛屎花 一款基于WEB界面的远程主机管理工具