0xAcid / CuckooMon---Calling-address
This repository is a clne of the new cuckoo monitor where I added some stuff to get the calling address for every hooked API
☆8Updated 8 years ago
Alternatives and similar repositories for CuckooMon---Calling-address:
Users that are interested in CuckooMon---Calling-address are comparing it to the libraries listed below
- does reflective dll injection☆8Updated 11 years ago
- ☆9Updated 7 years ago
- ☆7Updated 8 years ago
- wow64 syscall filter☆13Updated 10 years ago
- FaultInjection Project☆7Updated 8 years ago
- Windows registry files interactive viewer☆9Updated 7 years ago
- Project for Injecting into Windows Processes☆13Updated 12 years ago
- ☆12Updated 8 years ago
- Google Drive windows virtual unit☆9Updated 11 years ago
- Windows device tree walker☆15Updated 6 years ago
- ☆12Updated 10 years ago
- IDA WhatAPIs PlugIn☆7Updated 9 years ago
- windows内核小工具,包含APP和driver☆11Updated 10 years ago
- A system call tracer☆10Updated 10 years ago
- Dark Cloud Virus☆7Updated 7 years ago
- ☆7Updated 7 years ago
- Continuation of the popular patchdiff IDA plugin☆10Updated 10 years ago
- ☆9Updated 7 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Updated 7 years ago
- Lists work items being queued currently.☆13Updated 9 years ago
- ☆13Updated 7 years ago
- simple plugin for lastest olly versions to display the callstack☆16Updated 11 years ago
- A library for interacting with Windows process memory☆7Updated 6 years ago
- ShellcodeOS☆10Updated 8 years ago
- Windows Kernel Mode PCRE☆10Updated 10 years ago
- Cross-referencing network communication for detecting Advanced Persistent Threat (APT) malware☆6Updated 9 years ago
- XEDParse extension for windbg☆7Updated 7 years ago
- ☆15Updated 6 years ago
- Injectable Windows DLL which enforces a W^X memory policy on a process☆14Updated 8 years ago
- ☆9Updated 8 years ago