Stars
This is a very detailed Binary exploitation roadmap starting from the very first vulnerability to the latest , each one with its mitigation
An addon to manage (view, search, create, edit, remove, backup, restore) cookies on Firefox.
Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentionally introduced by the leaker to prevent the locker from bein…
rootkit-io / malware-and-exploitdev-resources
Forked from evilbuffer/malware-and-exploitdev-resourceslibrary for importing functions from dlls in a hidden, reverse engineer unfriendly way
A professionally designed desktop application and program to control the MySQL server remotely using Python
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
A slightly more fun way to disable windows defender + firewall. (through the WSC api)
Collection of various malicious functionality to aid in malware development
😎 Awesome lists about all kinds of interesting topics