Pinned Repositories
AsmCodeRun
csgo_modest
simple csgo cheat base
Discord-DX11-Overlay-Hook
Discord Hooking
frida-all-in-one
《FRIDA操作手册》by @hluwa @r0ysue
frida_hook_libart
Frida hook jni some functions
game_server
通用游戏服务器框架,支持多进程、多线程部署,支持TCP、WebSocket、Http协议
HackerTools
[转存]发一个自写的病毒工具技术合集 鬼手_277636
SnifferUI
基于MFC和Winpcap库开发的网络抓包软件
unicorn_pe
Unicorn PE is an unicorn based instrumentation project designed to emulate code execution for windows PE files.
WowDumpFix
https://github.com/adde88/WoW-Dump-Fix
wdnmd-RushB's Repositories
wdnmd-RushB/_xx_tvm
wdnmd-RushB/AL_Kernel_driver_hack
Android/Linux Kernel dirver read and write memory.
wdnmd-RushB/Android-Native-Import-Hide
A library for hiding and retrieving imports in ELF binaries.
wdnmd-RushB/Android_Native_Surface
安卓c++绘制和录屏
wdnmd-RushB/AndroidFrameworkTutorial
写给应用开发的 Android Framework 教程
wdnmd-RushB/AnXray
wdnmd-RushB/BlackBox
BlackBox is a virtual engine, it can clone and run virtual application on Android, users don't have to install APK file to run the application on devices. BlackBox control all virtual applications, so you can do anything you want by using BlackBox.
wdnmd-RushB/blacksun-framework
blacksun framework for QEMU/KVM game cheat development
wdnmd-RushB/Clash.Meta
A rule-based tunnel in Go.
wdnmd-RushB/CVE-2023-28229
wdnmd-RushB/cve-2023-29360
Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver
wdnmd-RushB/drivers-binaries
Exploitable drivers, you know what I mean
wdnmd-RushB/find_load_module
本工具用于在无Linux内核源码的情况下,查找出内核函数load_module的位置,确保在无内核源码的情况下,顺利去除所有加载驱动的验证,此工具适用于所有Linux ARM64内核
wdnmd-RushB/Genymotion_A11_libhoudini
Genymotion ARM, ARMv7, ARMv8/ARM64 Translation for Android 11
wdnmd-RushB/gzip-js-injector
GZIP 页面零开销注入 JS 演示
wdnmd-RushB/HPHardwareDiagnostics-PoC
PoC exploit for HP Hardware Diagnostic's EtdSupp driver
wdnmd-RushB/HyperHide
Hypervisor based anti anti debug plugin for x64dbg
wdnmd-RushB/Kernel-Cheat-for-directx3D
windows krnl cheat for hook dxgkrnl.sys
wdnmd-RushB/marlin_touch_set_input
通过模拟触摸屏控制器驱动来实现手机点击,滑动操作
wdnmd-RushB/nullmap
Using CVE-2023-21768 to manual map kernel mode driver
wdnmd-RushB/op2
Windows消息模拟,gdi,dx,opengl截图,找图,找字(OCR)
wdnmd-RushB/rellume
Lift machine code to performant LLVM IR
wdnmd-RushB/RWXAbusing
RWX Section Abusing
wdnmd-RushB/SDA
SDA is a rich cross-platform tool for reverse engineering that focused firstly on analysis of computer games. I'm trying to create a mix of the Ghidra, Cheat Engine and x64dbg. My tool will combine static and dynamic analysis of programs. Now SDA is being developed.
wdnmd-RushB/sperm
浏览过的精彩逆向文章汇总,值得一看
wdnmd-RushB/TestSigningModeFucker
TS-Fucker - Forces the machine in/out of TestSigning Mode at runtime.
wdnmd-RushB/veh_hooking
x64/x86 Function Hooking through VectoredExceptionHandler (PAGE_GUARD method)
wdnmd-RushB/WinDbg_Scripts
Useful scripts for WinDbg using the debugger data model
wdnmd-RushB/Windows-10-22H2-Vulnerable-driver-communication
Allocate memory in the kernel & r/w control registers with a vulnerable driver.
wdnmd-RushB/xflower
deobfuscation BR