kitokyo's repositories
libtomcrypt
LibTomCrypt is a fairly comprehensive, modular and portable cryptographic toolkit that provides developers with a vast array of well known published block ciphers, one-way hash functions, chaining modes, pseudo-random number generators, public key cryptography and a plethora of other routines.
XLMMacroDeobfuscator
Extracts and Deobfuscates XLM macros (a.k.a Excel 4.0 Macros)
CVE-2023-21608
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
defcon_27_windbg_workshop
DEFCON 27 workshop - Modern Debugging with WinDbg Preview
delete2SYSTEM
Arbitrary Files/Directories Delete to NT AUTHORITY\SYSTEM
Disclosures
Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts
drmemory
Memory Debugger for Windows, Linux, Mac, and Android
Dump-of-chrome-v8-pwn-resources
A dump of a bunch of resources regarding browser pwning. This should do until the download more ran button won't staire ugly back to me. But now in all seriousness it's a bunch of resource links. Ps. Sorry for the mess
evildll
Malicious DLL (Reverse Shell) generator for DLL Hijacking
faxhell
A Bind Shell Using the Fax Service and a DLL Hijack
funfuzz
A collection of fuzzers in a harness for testing the SpiderMonkey JavaScript engine.
fuzzing-1
Tutorials, examples, discussions, research proposals, and other resources related to fuzzing
github1s
One second to read GitHub code with VS Code.
hunting-mindmaps
:mag: Mindmaps for threat hunting - work in progress.
KasperskyHook
Hook system calls on Windows by using Kaspersky's hypervisor
lighthouse
A Code Coverage Explorer for IDA Pro & Binary Ninja
RpcSsImpersonator
Privilege Escalation Via RpcSs svc
sagetv
SageTV is a cross-platform networked DVR and media management system
tokenext
A windbg extension, extracting token related contents
Windows-API-Fuzzer
Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.
Windows-GDI-fuzzer
Windows Graphics Device Interface (GDI+) fuzzer
WindowsExploitationResources
Resources for Windows exploit development