Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
@forrest-orr
forrest-orr
Follow
View forrest-orr's full-sized avatar

forrest-orr

Block or report forrest-orr

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more aboutblocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more aboutreporting abuse.

Report abuse

Popular repositoriesLoading

  1. monetamonetaPublic

    Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs

    C++ 781 89

  2. phantom-dll-hollower-pocphantom-dll-hollower-pocPublic

    Phantom DLL hollowing PoC

    C++ 366 69

  3. artifacts-kitartifacts-kitPublic

    Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windows OS.

    C++ 233 53

  4. DoubleStarDoubleStarPublic

    A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of my own techniques

    JavaScript 147 28

  5. ExploitsExploitsPublic

    A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in conjunction with these exploits.

    C 120 14

  6. WizardOpiumWizardOpiumPublic

    Google Chrome Use After Free

    HTML 61 12


[8]ページ先頭

©2009-2025 Movatter.jp