Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
@aaaddress1
aaaddress1
Follow
View aaaddress1's full-sized avatar
🤗
buy me a beer plz 🍺

Sheng-Hao Ma aaaddress1

🤗
buy me a beer plz 🍺
30cm.tw/me

Block or report aaaddress1

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
aaaddress1 /README.md

Popular repositories Loading

  1. RunPE-In-Memory RunPE-In-Memory Public

    Run a Exe File (PE Module) in memory (like an Application Loader)

    C++ 936 174

  2. PR0CESS PR0CESS Public

    some gadgets about windows process and ready to use :)

    C 610 96

  3. Skrull Skrull Public

    Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting...

    C 458 84

  4. Windows-APT-Warfare Windows-APT-Warfare Public

    著作《Windows APT Warfare:惡意程式前線戰術指南》各章節技術實作之原始碼內容

    C++ 415 69

  5. wowInjector wowInjector Public

    PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)

    C 167 37

  6. my-Little-Ransomware my-Little-Ransomware Public

    easy ransomware module base on csharp.

    C# 129 102

AltStyle によって変換されたページ (->オリジナル) /