Highlights
- Pro
Stars
A type 1 & 2 hypervisor setup guide for evading detection from Proctors and Anti-Cheats.
It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)
Source code for the 2022 DEF CON Qualifiers.
ProLeap ANTLR4-based parser for Visual Basic 6.0
Prebuilt third party libs for Cocaine Diesel
Brief experiment implementing an interaction system and a dialogue system in UE4
The simple UEFI application to create a Windows Platform Binary Table (WPBT) from the UEFI shell.
Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories
AV/EDR evasion via direct system calls.
This is the pytorch implementation of Hindsight Experience Replay (HER) - Experiment on all fetch robotic environments.
Ghidra is a software reverse engineering (SRE) framework
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
Zero-Day Code Injection and Persistence Technique
A curated list of awesome remote jobs and resources. Inspired by https://github.com/vinta/awesome-python
A list of semi to fully remote-friendly companies (jobs) in tech.
xoreaxeaxeax / movfuscator
Forked from Battelle/movfuscatorThe single instruction C compiler
xoreaxeaxeax / reductio
Forked from Battelle/reductioAn exploration of code homeomorphism
Hypervisor based tool for monitoring system register accesses.
Platform independent peCloak fork based on Capstone
Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)