Lists (7)
Sort Name ascending (A-Z)
Starred repositories
The new Windows Terminal and the original Windows console host, all in the same place!
A high-performance distributed file system designed to address the challenges of AI training and inference workloads.
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Detours is a software package for monitoring and instrumenting API calls on Windows. It is distributed in source code form.
Performance-portable, length-agnostic SIMD with runtime dispatch
A graphical processor simulator and assembly editor for the RISC-V ISA
MITIE: library and tools for information extraction
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
Hook system calls, context switches, page faults and more.
KDMapper is a simple tool that exploits iqvw64e.sys Intel driver to manually map non-signed drivers in memory
Nidhogg is an all-in-one simple to use windows kernel rootkit.
A lightning fast Finite State machine and REgular expression manipulation library.
Alternative Shellcode Execution Via Callbacks
lightweight hypervisor SDK written in C++ with support for Windows, Linux and UEFI
interactive visualization of 5 popular gradient descent methods with step-by-step illustration and hyperparameter tuning UI
A lightweight dynamic instrumentation library
Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android
RpcView is a free tool to explore and decompile Microsoft RPC interfaces
kill anti-malware protected processes ( BYOVD ) ( Microsoft Won )
Win32 and Kernel abusing techniques for pentesters
Load self-signed drivers without TestSigning or disable DSE. Transferred from https://github.com/DoubleLabyrinth/Windows10-CustomKernelSigners
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation tech…
KrabsETW provides a modern C++ wrapper and a .NET wrapper around the low-level ETW trace consumption functions.
Open-source symbolic execution framework: https://maat.re
Checksec, but for Windows: static detection of security mitigations in executables
CVE-2020-15368, aka "How to exploit a vulnerable driver"