- Los Angeles, California
Stars
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
🛡 I2P: End-to-End encrypted and anonymous Internet
Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools
proof-of-concept implementation of tor protocol using Microsoft CNG/CryptoAPI
PowerLoaderEx - Advanced Code Injection Technique for x32 / x64
Proof of concept implementation of in-memory PE Loader based on ReflectiveDLLInjection Technique
Simple proof of concept code for injecting libraries on 64bit processes from a 32bit process
A multi-purpose meterpreter executable (inline, many transports, msfpayload)
Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )
HarmJ0y / netview
Forked from mubix/netviewNetview enumerates systems using WinAPI calls
cdfpaz / minibson
Forked from cyberguijarro/minibsonZero-dependency C++ BSON library.