0vercl0k / j0llyDmpr
j0llydmper is a windows service that allows you to dump furtively and automaticaly some contents of USB disks just plugged in your computer. In order to dump potentialy interesting files, you can use a rule on the file name or/and on the file size.
☆40Updated 13 years ago
Alternatives and similar repositories for j0llyDmpr:
Users that are interested in j0llyDmpr are comparing it to the libraries listed below
- Ring3 Rootkit Backdoor.☆41Updated 9 years ago
- Python script to inject and run shellcodes through TLS callbacks☆50Updated 9 years ago
- Notes about reverse engineering the Petya2017 ransomware☆18Updated 7 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- ☆43Updated 7 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 9 years ago
- ☆28Updated 7 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆50Updated 6 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Bootkit for Windows 7☆28Updated 10 years ago
- KINS Banking Trojan☆62Updated 10 years ago
- A script to reverse-engineer anti-virus signatures☆32Updated 12 years ago
- metasploit loader with antivirus bypass module☆17Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 8 years ago
- Application Security library☆11Updated 12 years ago
- A rootkit implemented as a linux kernel module☆17Updated 9 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Updated 8 years ago
- Dexter v2 - Point of Sales Trojan☆26Updated 10 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 12 years ago
- Code Injector Using Code Caves☆14Updated 9 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- ☆22Updated 7 years ago
- Malware monitor template based on MinHook☆16Updated 10 years ago
- Various Crypter Project☆51Updated 11 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- ☆24Updated 6 years ago
- ☆12Updated 8 years ago