Highlights
Stars
- All languages
- ASL
- ASP
- Assembly
- AutoHotkey
- Boo
- C
- C#
- C++
- CSS
- Classic ASP
- F#
- Go
- HCL
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Kaitai Struct
- Max
- Meson
- Objective-C
- OpenSCAD
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Rich Text Format
- Ruby
- Rust
- SMT
- Shell
- Smali
- Solidity
- TypeScript
- VBA
- Visual Basic
- Vue
- XProc
- YARA
WinVisor - A hypervisor-based emulator for Windows x64 user-mode executables using Windows Hypervisor Platform API
pySigma backend and pipeline for Qualys Query Language
PoC for the Untrusted Pointer Dereference in the ks.sys driver
Kernel pointers copied to output user mode buffer with ioctl 0x22A014 in the appid.sys driver.
Side-by-side comparison of the Windows and Linux (GNU) Loaders
A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.
Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post
Collection of undocumented Windows API declarations.
Unicorn PE is an unicorn based instrumentation project designed to emulate code execution for windows PE files.
Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address
Obfuscates all RTTI (Run-time type information) inside a binary
Hook system calls on Windows by using Kaspersky's hypervisor
Utilizes a kernel driver for hooking steams overlay than manual mapping our dll to the games memory. Has a bunch of features like esp and such.