- Windows-Kernel
Highlights
- Pro
Stars
stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage stack manipulations.
Repository for my flipper zero badUSB payloads. Now almost entirely plug and play.
📜 A collection of wordlists for many different usages
🐬 A collection of awesome resources for the Flipper Zero device.
🐬 Feature-rich, stable and customizable Flipper Firmware
Flipper Zero Unleashed Firmware
Keystone assembler framework: Core (Arm, Arm64, Hexagon, Mips, PowerPC, Sparc, SystemZ & X86) + bindings
0xnobody / driver_unpacking
Forked from mrexodia/driver_unpackingGhetto user mode emulation of Windows kernel drivers.
Capstone disassembly/disassembler framework for ARM, ARM64 (ARMv8), Alpha, BPF, Ethereum VM, HPPA, LoongArch, M68K, M680X, Mips, MOS65XX, PPC, RISC-V(rv32G/rv64G), SH, Sparc, SystemZ, TMS320C64X, T…
WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.
FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
Analyze Golang with x64dbg
C library for prototyping and experimenting with quantum-resistant cryptography
Proof of concept code for the Spectre CPU exploit.
A lightweight header-only C++ library to bring colors to your Windows console with a very-easy-to-use API.
A little tool to play with Windows security
Clean up user-submitted HTML, preserving whitelisted elements and whitelisted attributes on a per-element basis. Built on htmlparser2 for speed and tolerance
A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl
Playing with the VMProtect software protection. Automatic deobfuscation of pure functions using symbolic execution and LLVM.
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
mrpond / BlockTheSpot
Forked from master131/BlockTheSpotVideo, audio & banner adblock/skip for Spotify