Lists (1)
Sort Name ascending (A-Z)
Stars
Run Microsoft Windows NTVDM (DOS) on 64bit Editions
corellium / linux-m1
Forked from torvalds/linuxLinux kernel source tree
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
Exploiting DLL Hijacking by DLL Proxying Super Easily
Kernel Fuzzer for Xen Project (KF/x) - Hypervisor-based fuzzing using Xen VM forking, VMI & AFL
wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB")
This repository contains scripts, configurations and deprecated payload loaders for Brute Ratel C4 (https://bruteratel.com/)
Code samples for the Understanding Windows x64 Assembly tutorial.
This is a simple example and explanation of obfuscating API resolution via hashing
x64 Assembly HalosGate direct System Caller to evade EDR UserLand hooks
Defective SMb: A minimalist implementation of a client library for SMBv1 using Plain'Ol C
PageBuster - dump all executable pages of packed processes.
针对(CVE-2023-0179)漏洞利用 该漏洞被分配为CVE-2023-0179,影响了从5.5到6.2-rc3的所有Linux版本,该漏洞在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。
Exploit targeting NT kernel in 24H2 Windows Insider Preview