A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
-
Updated
Oct 10, 2024 - C++
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
Minimal Cross-Platform GUI written in Qt6 for shell-storm.org, allows to search, edit and save shellcode at your will.
rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.
A C99/C++17 compatible header only library capable of creating position independent shellcode.
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
The "DLLHijack Injection" tool enables the injection of malicious DLLs into target processes, allowing for DLL hijacking attacks. This technique can be used to exploit vulnerable applications by replacing legitimate DLLs with malicious ones, potentially leading to unauthorized access, data manipulation, or system compromise.
ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together
Android Kernel Exploitation
Research on Anti-malware and other related security solutions
Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.
Exploit code used for the HackSysExtremeVulnerableDriver.
Add a description, image, and links to the exploit-development topic page so that developers can more easily learn about it.
To associate your repository with the exploit-development topic, visit your repo's landing page and select "manage topics."