Ap3x

Ap3x

Geek Repo

Location:United States

Home Page:https://ap3x.github.io/

Twitter:@Ap3xSec

Github PK Tool:Github PK Tool

Ap3x's starred repositories

cilium

eBPF-based Networking, Security, and Observability

Language:GoLicense:Apache-2.0Stargazers:19436Issues:312Issues:9612

LIEF

LIEF - Library to Instrument Executable Formats

Language:C++License:Apache-2.0Stargazers:4311Issues:128Issues:795

ghw

Go HardWare discovery/inspection library

Language:GoLicense:Apache-2.0Stargazers:1615Issues:29Issues:131

lessmsi

A tool to view and extract the contents of an Windows Installer (.msi) file.

win32

Public mirror for win32-pr

Language:PowerShellLicense:CC-BY-4.0Stargazers:1053Issues:54Issues:0

AntiCheat-Testing-Framework

Framework to test any Anti-Cheat

Language:C++Stargazers:782Issues:40Issues:0

Windows10-CustomKernelSigners

Load self-signed drivers without TestSigning or disable DSE. Transferred from https://github.com/DoubleLabyrinth/Windows10-CustomKernelSigners

SOREL-20M

Sophos-ReversingLabs 20 million sample dataset

Language:PythonLicense:Apache-2.0Stargazers:619Issues:31Issues:23

GoRedOps

🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Go programming language, all is made for educational purpoeses only.

Language:GoLicense:UnlicenseStargazers:305Issues:5Issues:0

COM-Hunter

COM Hijacking VOODOO

Language:C#License:MITStargazers:250Issues:2Issues:2

KExecDD

Admin to Kernel code execution using the KSecDD driver

malware_api_class

Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API calls analysis for cyber security researchers

Language:PythonLicense:MITStargazers:221Issues:8Issues:2

The_Shelf

Retired TrustedSec Capabilities

Language:PythonLicense:NOASSERTIONStargazers:214Issues:25Issues:0

gdrv-loader

Kernel driver loader using vulnerable gigabyte driver (https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities) to load a unsigned driver

Language:CStargazers:208Issues:2Issues:0

illusion-rs

Rusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion)

Language:RustLicense:MITStargazers:206Issues:4Issues:16

MDE_Enum

comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reduction (ASR) rules without Admin privileges

Language:C#License:MITStargazers:191Issues:4Issues:1

reverse-engineering-workshop

Slides & Hands-on for the reverse engineering workshop

ntoskrnl

The Windows Research Kernel (WRK)

Language:CStargazers:166Issues:4Issues:0

Venoma

Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution

DirtyCLR

An App Domain Manager Injection DLL PoC on steroids

Language:C#License:GPL-3.0Stargazers:150Issues:2Issues:0
Language:CLicense:NOASSERTIONStargazers:122Issues:0Issues:0
Language:RustLicense:MITStargazers:73Issues:2Issues:0

KReClassEx

Kernel ReClassEx

Language:C++License:MITStargazers:60Issues:1Issues:0

TS-Changer

TS-Changer - Forces the machine in/out of TestSigning Mode at runtime.

Language:C++License:MITStargazers:58Issues:2Issues:4

MSFT_DriverBlockList

Repository of Microsoft Driver Block Lists based off of OS-builds

License:MITStargazers:36Issues:2Issues:0

IPC-demo

Linux Inter Process Communication examples

Language:CStargazers:36Issues:1Issues:0

VerifierDLL

Example of building an application verifer DLL

Language:C++License:MITStargazers:30Issues:2Issues:0