storm - e/acc's Projects
Win32 Binary Analysis Tools
Every resource one would ever need
This repo covers Branch and Jump Tables in C and x86 assembly. Branch Tables handle jumps within a subroutine, while Jump Tables facilitate dynamic subroutine calls. Examples and step-by-step explanations are provided for a deeper understanding.
CMU Systems Programming course resources incl. course website, labs, schedule, & extra material. Books: "Computer Systems: A Programmer's Perspective" & "The C Programming Language". Repository includes resources on C programming, incl. Stanford engineering lectures, GCC's C99, & bit-hacking.
Documentation and source code powering Twitter's Community Notes
By passing an overly large string when invoking nethack, it is possible to corrupt memory. jnethack and falconseye are also prone to this vulnerability.
CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent
Diablo1 Source Code
SEH Overflow for DiskPulse Enterprise v10.0.12 Web Server
DOOM Open Source Release
Full exploit chain for Faronics-DeepFreeze-8
Remote Exploit for Fastback server
A handy WinDBG script for finding PPR instructions
A collection of resources for linux reverse engineering
Automatically exported from code.google.com/p/narly
A modern Neovim configuration with full battery for Python, Lua, C++, Markdown, LaTeX, and more...
Network Packet Sniffer with a web-based UI
xorencode.c encode your shellcode
Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers
A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization, interprocess communication, Unicode string manipulation, error handling, Winsock networking operations, and registry operations.
A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level security.
Notes template for Offensive Security's EXP-301 course and OSED exam
Reads an assembly language file, performs two passes over the file to identify labels and assemble the instructions, and then writes the resulting machine code to an output file. It includes several helper functions for handling instructions, managing a hash table for storing labels, and writing the machine code to the output file.