bopin's repositories
HackBrowserData
Decrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。
herpaderping
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
malware_rl
Malware Bypass Research using Reinforcement Learning
MetroRadiance
Modern WPF Themes (like Visual Studio 2012 or later).
ADSearch
A tool to help query AD via the LDAP protocol
Anti-Debug
Anti-Debug
apc-research
APC Internals Research Code
artifacts-kit
Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windows OS.
AspNetCore.Docs
Documentation for ASP.NET Core
bypassAntivirus2020
How to bypass antivirus 2020
dnSpy
.NET debugger and assembly editor
FALCONSTRIKE
A stealthy, targeted Windows Loader for delivering second-stage payloads(shellcode) from Github to the host machine undetected
GRAT2
We developed GRAT2 Command & Control (C2) project for learning purpose.
HellsGate
Original C Implementation of the Hell's Gate VX Technique
learning-reverse-engineering
This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.
openedr
Open EDR public repository
physmem2profit
Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely
PolyHook
x86/x64 C++ Hooking Library
PSBits
Simple (relatively) things allowing you to dig a bit deeper than usual.
serpentine
Windows RAT (Remote Administration Tool) with a multiplatform RESTful C2 server
SharpCall
Simple PoC demonstrating syscall execution in C#
snoopwpf
Snoop - The WPF Spy Utility
spectre
A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.
win32k-bugs
Dump of win32k POCs for bugs I've found
Windows-kernel-SegmentHeap-Aligned-Chunk-Confusion
PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap
windows-ps-callbacks-experiments
Files for http://deniable.org/windows/windows-callbacks