lx's starred repositories
Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Hackintosh
Hackintosh long-term maintenance model EFI and installation tutorial
awesome-virtualization
Collection of resources about Virtualization
WindowsExploitationResources
Resources for Windows exploit development
malware-samples
Malware samples, analysis exercises and other interesting resources.
CyberThreatIntel
Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups
windows-security
Resources About Windows Security. 1100+ Open Source Tools. 3300+ Blog Post and Videos.
awesome-hyper-v-exploitation
A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.
Windows-APT-Warfare
著作《Windows APT Warfare:惡意程式前線戰術指南》各章節技術實作之原始碼內容
Windows-Non-Paged-Pool-Overflow-Exploitation
Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow
Windows-Batch-Deployment
A programmable and rootkit-like Windows remote access tool.
LazyFragmentationHeap
WCTF 2019 challenge
Detect-Hooks
Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR
chris124567.github.io
:sparkles: Build a beautiful and simple website in literally minutes. Demo at https://beautifuljekyll.com
trivial-vm
The most trivial virtual machine that can run a few x86 machine code instructions.