Stars
Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when it's get loaded into the explorer process , our malicoius co…
Polaris: An LLVM-based obfuscator that protects software at various levels
A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and reflection techniques for code injection. This PoC showcases…
🧑🚀 全世界最好的LLM资料总结(数据处理、模型训练、模型部署、o1 模型、MCP、小语言模型、视觉语言模型) | Summary of the world's best LLM resources.
obfuscated any constant encryption in compile time on any platform
🚀🚀 「大模型」2小时完全从0训练26M的小参数GPT!🌏 Train a 26M-parameter GPT from scratch in just 2h!
攻防演练过程中,我们通常会用浏览器访问一些资产,但很多未授权/敏感信息/越权隐匿在已访问接口过html、JS文件等,该插件能让我们发现未授权/敏感信息/越权/登陆接口等。
UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.
Macro-header for compile-time C obfuscation (tcc, win x86/x64)
howmp / donut_ollvm
Forked from TheWover/donutGenerates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
An online AV evasion platform written in Springboot (Golang, Nim, C) supports embedded, local and remote loading of Shellocde methods.
Simple x86/x86_64 instruction level obfuscator based on a basic SBI engine
Dynamically generated obfuscated jumps and/or function calls
Obfuscate specific windows apis with different apis
Xeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system management. Has features such as HVNC, live microphone, reverse prox…
Details on how to get Binance public data
ROP-based sleep obfuscation to evade memory scanners
C++ 17 or higher control flow obfuscation library for windows binaries
[WIP] 整理过去的分享,从零开始的Kubernetes攻防 🧐
Simple Kernelmode DLL Injector with Manual mapping
主要用来收集/学习爬虫相关技术如:js逆向、app逆向、抓包、验证码、加密技术、自动化技术、机器学习。
msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to guide fuzzing.