Stars
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
ASCII generator (image to text, image to image, video to video)
Brand New Code Injection for Windows
Capstone disassembly/disassembler framework for ARM, ARM64 (ARMv8), Alpha, BPF, Ethereum VM, HPPA, LoongArch, M68K, M680X, Mips, MOS65XX, PPC, RISC-V(rv32G/rv64G), SH, Sparc, SystemZ, TMS320C64X, T…
Template-Driven AV/EDR Evasion Framework
SysWhispers on Steroids - AV/EDR evasion via direct system calls.
Hex-Rays Decompiler plugin for better code navigation
This tool, programmed in C#, allows for the fast discovery and exploitation of vulnerabilities in MSSQL servers
Dumping LSASS with a duplicated handle from custom LSA plugin
Win32 and Kernel abusing techniques for pentesters
Resources for Windows exploit development
A repository for learning various heap exploitation techniques.
Hook system calls, context switches, page faults and more.
Useful scripts for WinDbg using the debugger data model
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
Rust Weaponization for Red Team Engagements.