Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
-
Updated
Jul 5, 2023 - C++
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)
mXtract - Memory Extractor & Analyzer
Android Kernel Exploitation
Research on Anti-malware and other related security solutions
Pure C++, weaponized, fully automated implementation of RottenPotatoNG
Exploitation Framework for ATtiny85 Based HID Attacks
An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit
Source code of exploiting windows API for red teaming series
Exploit code used for the HackSysExtremeVulnerableDriver.
EmpireCTF – write-ups, capture the flag, cybersecurity
RVDbg is a debugger/exception handler for Windows processes and has the capability to circumvent anti-debugging techniques. (Cleaner, documented code base being worked on in: core branch)
vdk is a set of utilities used to help with exploitation of a vulnerable driver.
Arducky - Arduino Ducky Script Interpreter
Solutions of HackSysExtremeVulnerableDriver
A collection of resources and information about CVE-2023-2033
Windows Binary Exploitation Writeups
An open-source x64/x32 debugger for windows.
Minimal Cross-Platform GUI written in Qt6 for shell-storm.org, allows to search, edit and save shellcode at your will.
Add a description, image, and links to the exploitation topic page so that developers can more easily learn about it.
To associate your repository with the exploitation topic, visit your repo's landing page and select "manage topics."