├── README.md ├── compiling ├── commands.txt └── hello_world.c ├── crackmes ├── ESIL.txt ├── IOLI │ ├── crackme0x00.exe │ ├── crackme0x01.exe │ ├── crackme0x02.exe │ ├── crackme0x03.exe │ ├── crackme0x04.exe │ ├── crackme0x05.exe │ ├── crackme0x06.exe │ ├── crackme0x07.exe │ ├── crackme0x08.exe │ └── crackme0x09.exe └── r2pipe_test.py ├── demo1_32bits ├── maldev.7z └── password.txt ├── demo2_64bits ├── coblatstrike_shellcode.7z ├── password.txt └── powershell_command.txt ├── dummy_programs ├── call_sum.c ├── endianness.c ├── heap_stack.c ├── int_global.c ├── int_local.c └── msgbox.c ├── radare2_doc └── r2_(radare2)_-_gui_a_de_supervivencia-v1.pdf ├── slides └── Rooted_CON_Malaga_2021_Reversing_de_Malware_Para_Humanos_by_apasamar.zip └── tools ├── ExplorerSuite.exe ├── HxDSetup.zip ├── ImmunityDebugger_1_85_setup.exe ├── PE-bear_0.5.3.2_qt4_x86_win_vs10 ├── PE-bear.exe ├── QtCore4.dll ├── QtGui4.dll ├── SIG.txt ├── capstone_LICENSE.TXT ├── imageformats │ └── qico4.dll ├── msvcp100.dll └── msvcr100.dll ├── api-monitor-v2r13-setup-x64.exe ├── api-monitor-v2r13-setup-x86.exe ├── nc.exe ├── processhacker-2.39-bin ├── CHANGELOG.txt ├── COPYRIGHT.txt ├── LICENSE.txt ├── README.txt ├── x64 │ ├── ProcessHacker.exe │ ├── ProcessHacker.sig │ ├── kprocesshacker.sys │ ├── peview.exe │ └── plugins │ │ ├── DotNetTools.dll │ │ ├── ExtendedNotifications.dll │ │ ├── ExtendedServices.dll │ │ ├── ExtendedTools.dll │ │ ├── HardwareDevices.dll │ │ ├── NetworkTools.dll │ │ ├── OnlineChecks.dll │ │ ├── SbieSupport.dll │ │ ├── ToolStatus.dll │ │ ├── Updater.dll │ │ ├── UserNotes.dll │ │ └── WindowExplorer.dll └── x86 │ ├── ProcessHacker.exe │ ├── ProcessHacker.sig │ ├── kprocesshacker.sys │ ├── peview.exe │ └── plugins │ ├── DotNetTools.dll │ ├── ExtendedNotifications.dll │ ├── ExtendedServices.dll │ ├── ExtendedTools.dll │ ├── HardwareDevices.dll │ ├── NetworkTools.dll │ ├── OnlineChecks.dll │ ├── SbieSupport.dll │ ├── ToolStatus.dll │ ├── Updater.dll │ ├── UserNotes.dll │ └── WindowExplorer.dll └── shellcode2exe-master ├── GoLink.exe ├── README.md ├── shellcode2exe.bat └── yasm.exe /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/README.md -------------------------------------------------------------------------------- /compiling/commands.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/compiling/commands.txt -------------------------------------------------------------------------------- /compiling/hello_world.c: -------------------------------------------------------------------------------- 1 | #include 2 | 3 | int main(){ 4 | printf("Hello World!\n"); 5 | return 0; 6 | } 7 | -------------------------------------------------------------------------------- /crackmes/ESIL.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/crackmes/ESIL.txt -------------------------------------------------------------------------------- /crackmes/IOLI/crackme0x00.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/crackmes/IOLI/crackme0x00.exe -------------------------------------------------------------------------------- /crackmes/IOLI/crackme0x01.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/crackmes/IOLI/crackme0x01.exe -------------------------------------------------------------------------------- /crackmes/IOLI/crackme0x02.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/crackmes/IOLI/crackme0x02.exe -------------------------------------------------------------------------------- /crackmes/IOLI/crackme0x03.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/crackmes/IOLI/crackme0x03.exe -------------------------------------------------------------------------------- /crackmes/IOLI/crackme0x04.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/crackmes/IOLI/crackme0x04.exe -------------------------------------------------------------------------------- /crackmes/IOLI/crackme0x05.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/crackmes/IOLI/crackme0x05.exe -------------------------------------------------------------------------------- /crackmes/IOLI/crackme0x06.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/crackmes/IOLI/crackme0x06.exe -------------------------------------------------------------------------------- /crackmes/IOLI/crackme0x07.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/crackmes/IOLI/crackme0x07.exe -------------------------------------------------------------------------------- /crackmes/IOLI/crackme0x08.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/crackmes/IOLI/crackme0x08.exe -------------------------------------------------------------------------------- /crackmes/IOLI/crackme0x09.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/crackmes/IOLI/crackme0x09.exe -------------------------------------------------------------------------------- /crackmes/r2pipe_test.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/crackmes/r2pipe_test.py -------------------------------------------------------------------------------- /demo1_32bits/maldev.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/demo1_32bits/maldev.7z -------------------------------------------------------------------------------- /demo1_32bits/password.txt: -------------------------------------------------------------------------------- 1 | infected 2 | -------------------------------------------------------------------------------- /demo2_64bits/coblatstrike_shellcode.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/demo2_64bits/coblatstrike_shellcode.7z -------------------------------------------------------------------------------- /demo2_64bits/password.txt: -------------------------------------------------------------------------------- 1 | infected 2 | -------------------------------------------------------------------------------- /demo2_64bits/powershell_command.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/demo2_64bits/powershell_command.txt -------------------------------------------------------------------------------- /dummy_programs/call_sum.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/dummy_programs/call_sum.c -------------------------------------------------------------------------------- /dummy_programs/endianness.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/dummy_programs/endianness.c -------------------------------------------------------------------------------- /dummy_programs/heap_stack.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/dummy_programs/heap_stack.c -------------------------------------------------------------------------------- /dummy_programs/int_global.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/dummy_programs/int_global.c -------------------------------------------------------------------------------- /dummy_programs/int_local.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/dummy_programs/int_local.c -------------------------------------------------------------------------------- /dummy_programs/msgbox.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/dummy_programs/msgbox.c -------------------------------------------------------------------------------- /radare2_doc/r2_(radare2)_-_gui_a_de_supervivencia-v1.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/radare2_doc/r2_(radare2)_-_gui_a_de_supervivencia-v1.pdf -------------------------------------------------------------------------------- /slides/Rooted_CON_Malaga_2021_Reversing_de_Malware_Para_Humanos_by_apasamar.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/slides/Rooted_CON_Malaga_2021_Reversing_de_Malware_Para_Humanos_by_apasamar.zip -------------------------------------------------------------------------------- /tools/ExplorerSuite.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/ExplorerSuite.exe -------------------------------------------------------------------------------- /tools/HxDSetup.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/HxDSetup.zip -------------------------------------------------------------------------------- /tools/ImmunityDebugger_1_85_setup.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/ImmunityDebugger_1_85_setup.exe -------------------------------------------------------------------------------- /tools/PE-bear_0.5.3.2_qt4_x86_win_vs10/PE-bear.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/PE-bear_0.5.3.2_qt4_x86_win_vs10/PE-bear.exe -------------------------------------------------------------------------------- /tools/PE-bear_0.5.3.2_qt4_x86_win_vs10/QtCore4.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/PE-bear_0.5.3.2_qt4_x86_win_vs10/QtCore4.dll -------------------------------------------------------------------------------- /tools/PE-bear_0.5.3.2_qt4_x86_win_vs10/QtGui4.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/PE-bear_0.5.3.2_qt4_x86_win_vs10/QtGui4.dll -------------------------------------------------------------------------------- /tools/PE-bear_0.5.3.2_qt4_x86_win_vs10/SIG.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/PE-bear_0.5.3.2_qt4_x86_win_vs10/SIG.txt -------------------------------------------------------------------------------- /tools/PE-bear_0.5.3.2_qt4_x86_win_vs10/capstone_LICENSE.TXT: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/PE-bear_0.5.3.2_qt4_x86_win_vs10/capstone_LICENSE.TXT -------------------------------------------------------------------------------- /tools/PE-bear_0.5.3.2_qt4_x86_win_vs10/imageformats/qico4.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/PE-bear_0.5.3.2_qt4_x86_win_vs10/imageformats/qico4.dll -------------------------------------------------------------------------------- /tools/PE-bear_0.5.3.2_qt4_x86_win_vs10/msvcp100.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/PE-bear_0.5.3.2_qt4_x86_win_vs10/msvcp100.dll -------------------------------------------------------------------------------- /tools/PE-bear_0.5.3.2_qt4_x86_win_vs10/msvcr100.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/PE-bear_0.5.3.2_qt4_x86_win_vs10/msvcr100.dll -------------------------------------------------------------------------------- /tools/api-monitor-v2r13-setup-x64.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/api-monitor-v2r13-setup-x64.exe -------------------------------------------------------------------------------- /tools/api-monitor-v2r13-setup-x86.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/api-monitor-v2r13-setup-x86.exe -------------------------------------------------------------------------------- /tools/nc.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/nc.exe -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/CHANGELOG.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/CHANGELOG.txt -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/COPYRIGHT.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/COPYRIGHT.txt -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/LICENSE.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/LICENSE.txt -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/README.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/README.txt -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x64/ProcessHacker.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x64/ProcessHacker.exe -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x64/ProcessHacker.sig: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x64/ProcessHacker.sig -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x64/kprocesshacker.sys: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x64/kprocesshacker.sys -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x64/peview.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x64/peview.exe -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x64/plugins/DotNetTools.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x64/plugins/DotNetTools.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x64/plugins/ExtendedNotifications.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x64/plugins/ExtendedNotifications.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x64/plugins/ExtendedServices.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x64/plugins/ExtendedServices.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x64/plugins/ExtendedTools.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x64/plugins/ExtendedTools.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x64/plugins/HardwareDevices.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x64/plugins/HardwareDevices.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x64/plugins/NetworkTools.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x64/plugins/NetworkTools.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x64/plugins/OnlineChecks.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x64/plugins/OnlineChecks.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x64/plugins/SbieSupport.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x64/plugins/SbieSupport.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x64/plugins/ToolStatus.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x64/plugins/ToolStatus.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x64/plugins/Updater.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x64/plugins/Updater.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x64/plugins/UserNotes.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x64/plugins/UserNotes.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x64/plugins/WindowExplorer.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x64/plugins/WindowExplorer.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x86/ProcessHacker.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x86/ProcessHacker.exe -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x86/ProcessHacker.sig: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x86/ProcessHacker.sig -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x86/kprocesshacker.sys: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x86/kprocesshacker.sys -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x86/peview.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x86/peview.exe -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x86/plugins/DotNetTools.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x86/plugins/DotNetTools.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x86/plugins/ExtendedNotifications.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x86/plugins/ExtendedNotifications.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x86/plugins/ExtendedServices.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x86/plugins/ExtendedServices.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x86/plugins/ExtendedTools.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x86/plugins/ExtendedTools.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x86/plugins/HardwareDevices.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x86/plugins/HardwareDevices.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x86/plugins/NetworkTools.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x86/plugins/NetworkTools.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x86/plugins/OnlineChecks.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x86/plugins/OnlineChecks.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x86/plugins/SbieSupport.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x86/plugins/SbieSupport.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x86/plugins/ToolStatus.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x86/plugins/ToolStatus.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x86/plugins/Updater.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x86/plugins/Updater.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x86/plugins/UserNotes.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x86/plugins/UserNotes.dll -------------------------------------------------------------------------------- /tools/processhacker-2.39-bin/x86/plugins/WindowExplorer.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/processhacker-2.39-bin/x86/plugins/WindowExplorer.dll -------------------------------------------------------------------------------- /tools/shellcode2exe-master/GoLink.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/shellcode2exe-master/GoLink.exe -------------------------------------------------------------------------------- /tools/shellcode2exe-master/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/shellcode2exe-master/README.md -------------------------------------------------------------------------------- /tools/shellcode2exe-master/shellcode2exe.bat: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/shellcode2exe-master/shellcode2exe.bat -------------------------------------------------------------------------------- /tools/shellcode2exe-master/yasm.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/apasamar/RootedCON_Malaga2021/HEAD/tools/shellcode2exe-master/yasm.exe --------------------------------------------------------------------------------