Top Repositories
Windows kernel driver prototype exploring hardware-assisted validation of user-mode call stack integrity on AMD64 systems. The current implementation establishes the memory-side validation layer and prepares the infrastructure for future IBS-based execution trace correlation.
Explanation and Proof of Concept of the Process Hollowing (Windows) technique, commonly used by malware and game hackers to bypass security systems
A kernel-mode architectural integrity auditor for Windows x64. Validates critical hardware registers (MSR_LSTAR, IDTR, CR4) against kernel memory boundaries to detect low-level hooks and rootkit compromises.
Extension de VSCode para dar sintaxis , inclusion de snippets, un checkeo de errores simple y determinacion de bloques para Pseudocódigo según los estándares de la UNPSJB
Converts Base64 Strings from .NET executables to their ascii/utf8 representations, used for decrypt strings encrypted by some .NET Obfuscatators
Automatic tool for found mouse macros and the file modification of this
Repositories
15Windows kernel driver prototype exploring hardware-assisted validation of user-mode call stack integrity on AMD64 systems. The current implementation establishes the memory-side validation layer and prepares the infrastructure for future IBS-based execution trace correlation.
No description provided.
A kernel-mode architectural integrity auditor for Windows x64. Validates critical hardware registers (MSR_LSTAR, IDTR, CR4) against kernel memory boundaries to detect low-level hooks and rootkit compromises.
Explanation and Proof of Concept of the Process Hollowing (Windows) technique, commonly used by malware and game hackers to bypass security systems
university work
Converts Base64 Strings from .NET executables to their ascii/utf8 representations, used for decrypt strings encrypted by some .NET Obfuscatators
Avoid the old joke of invoking a BSOD when debugging, commonly used by some cheats
Fluently detect security measures in software.
Proof of concept demonstrating shellcode injection techniques in processes evading disk-based detections
Explanation and Proof of Concept of the Manual Map Injection (Windows) technique, commonly used by malware and game hackers to bypass security systems
Extension de VSCode para dar sintaxis , inclusion de snippets, un checkeo de errores simple y determinacion de bloques para Pseudocódigo según los estándares de la UNPSJB
Source code files of ex website https://katana.cam
Delete common worm virus found in removable USB drives
Source code files of ex website https://goldentool.net
Automatic tool for found mouse macros and the file modification of this