![]() ![]() Rdimo/Defender-disabler - a simple but destructive batch script that will disable windows defender, task manager, registerytools, cmd, bypass tamper protection and alot more.gsuberland/lbfo_win10 - Re-enable NIC teaming (LBFO) in Windows 10 using components from Windows Server.lxgw/LxgwWenKai - An open-source Chinese font derived from Fontworks' Klee One.xianyukang/MyKeymap - MyKeymap: 我的按键映射工具.tinysec/windows-syscall-table - windows syscall table from xp ~ 10 rs4.jthuraisamy/SysWhispers - AV/EDR evasion via direct system calls.antonioCoco/Mapping-Injection - Just another Windows Process Injection.vxunderground/MalwareSourceCode - Collection of malware source code for a variety of platforms in an array of different programming languages.jjyr/jonesforth_riscv - Jonesforth RISC-V port.mytechnotalent/Reverse-Engineering - A FREE comprehensive reverse engineering tutorial covering x86, 圆4, 32-bit ARM & 64-bit ARM architectures.jthuraisamy/SysWhispers2 - AV/EDR evasion via direct system calls.mai1zhi2/SysWhispers2_x86 - X86 version of syswhispers2 / x86 direct system call.DownWithUp/DynamicKernelShellcode - An example of how 圆4 kernel shellcode can dynamically find and use APIs.guitmz/memrun - Small tool to run ELF binaries from memory with a given process name.klezVirus/inceptor - Template-Driven AV/EDR Evasion Framework.timwhitez/Doge-Direct-Syscall - Golang Direct Syscall.MortenSchenk/Token-Stealing-Shellcode. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |