Stars
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Advanced usermode anti-anti-debugger. Forked from https://bitbucket.org/NtQuery/scyllahide
Bluetooth LE Keyboard library for the ESP32 (Arduino IDE compatible)
KDMapper is a simple tool that exploits iqvw64e.sys Intel driver to manually map non-signed drivers in memory
Disable PatchGuard and Driver Signature Enforcement at boot time
Walking the callstack in windows applications
Brand New Code Injection for Windows
This tool will allow you to spoof the return addresses of your functions as well as system functions.
Simple C++ DLL Manual Map Injector For x86 and x64
DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely
Reverse engineering winapi function loadlibrary.
A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32 and ESP8266
Zero EAT touch way to retrieve function addresses (GetProcAddress on steroids)
Print compiler information stored in Rich Header of PE executables.
A general solution to simulate execution of virtualized instructions (vmprotect/themida, etc.).
Small application that can be used to log loader snaps and other debug output
Making syscall calls in regions with the SEC_NO_CHANGE flag
An example of COM hijacking using a proxy DLL.
libcodecs is part of the "Huorong eXtendible Stream Scan Engine" project copyright by Huorong Borui (Beijing) Technology Co., Ltd.