Matteo Malvica's repositories
CVE-2020-17382
PoC exploits for CVE-2020-17382
windows-ps-callbacks-experiments
Files for http://blog.deniable.org/posts/windows-callbacks/
rootkit-arsenal-guacamole
An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples
alkaline-injector
Different code-injections techniques under a common tool
auditd-mitre
Enhanced MITRE auditd rules for linux
binary_analysis
binary analysis tools
nastia-antidisasm-antideb
A collection of antidebugger/antireversing tools
practical_reverse_engineering
Practical Reverse Engineering book exercises
ProcessAmp
A simple driver that boosts priority on each thread of a given process
CFG_Allowed_Functions
A version-independent tool that dumps Control Flow Guard allowed functions
idapython-scripts
A collection of IDApython scripts sorted by topic:
shellcodes
A collection of shellcodes
xorpd-solutions
[SPOILER ALERT] My attempt at tackling the x86_64 asm riddles in xorpd's xchg rax,rax book. Pull requests welcome.
exploit_dev
A collection of various exploits
custombase
Encode or decode base64 or base32 using a custom alphabet
hugo-theme-hello-friend-uf0
Pretty basic theme for Hugo that covers all of the essentials. All you have to do is start typing!
ioctlfuzzer
Automatically exported from code.google.com/p/ioctlfuzzer
puppetstrings
Hitch a free ride to Ring 0 on Windows
SNIcat
SNIcat
stager.dll
Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/