Skip to content
View sm4sh1t's full-sized avatar

Block or report sm4sh1t

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. gef-heapme gef-heapme Public

    Forked from htejeda/gef

    GEF - GDB Enhanced Features for exploit devs & reversers

    Python 1

  2. Evasive-Loader Evasive-Loader Public

    Forked from Ethicalrat/Evasive-Loader

    Evasive loader to bypass static detection

    C

  3. DEFCON-31-Syscalls-Workshop DEFCON-31-Syscalls-Workshop Public

    Forked from VirtualAlllocEx/DEFCON-31-Syscalls-Workshop

    Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".

    C

  4. Direct-Syscalls-vs-Indirect-Syscalls Direct-Syscalls-vs-Indirect-Syscalls Public

    Forked from VirtualAlllocEx/Direct-Syscalls-vs-Indirect-Syscalls

    The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls

    C

  5. Direct-Syscalls-A-journey-from-high-to-low Direct-Syscalls-A-journey-from-high-to-low Public

    Forked from VirtualAlllocEx/Direct-Syscalls-A-journey-from-high-to-low

    Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low level).

    C

  6. CallstackSpoofingPOC CallstackSpoofingPOC Public

    Forked from VirtualAlllocEx/CallstackSpoofingPOC

    C++ self-Injecting dropper based on various EDR evasion techniques.

    C++