0xAcid / CuckooMon---Calling-address
This repository is a clne of the new cuckoo monitor where I added some stuff to get the calling address for every hooked API
☆8Updated 8 years ago
Alternatives and similar repositories for CuckooMon---Calling-address:
Users that are interested in CuckooMon---Calling-address are comparing it to the libraries listed below
- ☆7Updated 8 years ago
- Project for Injecting into Windows Processes☆13Updated 13 years ago
- wow64 syscall filter☆13Updated 10 years ago
- Windows registry files interactive viewer☆9Updated 8 years ago
- does reflective dll injection☆8Updated 11 years ago
- ☆9Updated 7 years ago
- FaultInjection Project☆7Updated 9 years ago
- Google Drive windows virtual unit☆9Updated 11 years ago
- ☆12Updated 8 years ago
- ☆12Updated 10 years ago
- IDA WhatAPIs PlugIn☆7Updated 9 years ago
- simple plugin for lastest olly versions to display the callstack☆16Updated 12 years ago
- A system call tracer☆10Updated 10 years ago
- windows内核小工具,包含APP和driver☆11Updated 10 years ago
- Windows device tree walker☆15Updated 6 years ago
- Cross-referencing network communication for detecting Advanced Persistent Threat (APT) malware☆6Updated 9 years ago
- Dynamic binary analysis via platform emulation☆12Updated 6 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Updated 7 years ago
- Continuation of the popular patchdiff IDA plugin☆10Updated 10 years ago
- ☆13Updated 7 years ago
- Windows Kernel Mode PCRE☆10Updated 10 years ago
- Lists work items being queued currently.☆13Updated 9 years ago
- A library for interacting with Windows process memory☆7Updated 6 years ago
- Dark Cloud Virus☆7Updated 7 years ago
- ☆7Updated 7 years ago
- ☆15Updated 6 years ago
- libemu – x86 Shellcode Emulation☆9Updated 8 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- Flash Exploit Detector☆7Updated 9 years ago
- ☆9Updated 7 years ago