Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
-
Updated
Jul 5, 2023 - C++
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)
Android Kernel Exploitation
mXtract - Memory Extractor & Analyzer
Exploitation Framework for ATtiny85 Based HID Attacks
Pure C++, weaponized, fully automated implementation of RottenPotatoNG
Research on Anti-malware and other related security solutions
Source code of exploiting windows API for red teaming series
EmpireCTF – write-ups, capture the flag, cybersecurity
An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit
RVDbg is a debugger/exception handler for Windows processes and has the capability to circumvent anti-debugging techniques. (Cleaner, documented code base being worked on in: core branch)
Exploit code used for the HackSysExtremeVulnerableDriver.
vdk is a set of utilities used to help with exploitation of a vulnerable driver.
Arducky - Arduino Ducky Script Interpreter
A collection of resources and information about CVE-2023-2033
Minimal Cross-Platform GUI written in Qt6 for shell-storm.org, allows to search, edit and save shellcode at your will.
Solutions of HackSysExtremeVulnerableDriver
Windows Binary Exploitation Writeups
REILLY is a Reinforcement Learning Library based on "Reinforcement Learning - An Introduction (second edition)" written by Sutton & Barto, developed with love by a foolish couple of computer scientists.
Add a description, image, and links to the exploitation topic page so that developers can more easily learn about it.
To associate your repository with the exploitation topic, visit your repo's landing page and select "manage topics."