Tools for instrumenting Windows Defender's mpengine.dll
☆311Oct 25, 2018Updated 7 years ago
Alternatives and similar repositories for WindowsDefenderTools
Users that are interested in WindowsDefenderTools are comparing it to the libraries listed below
Sorting:
- Extract Windows Defender database from vdm files and unpack it☆475Updated this week
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆754Nov 16, 2021Updated 4 years ago
- Expriments☆478Oct 3, 2024Updated last year
- ☆208Apr 5, 2022Updated 3 years ago
- Research on Windows Kernel Executive Callback Objects☆315Feb 22, 2020Updated 6 years ago
- ☆118Aug 7, 2022Updated 3 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆633Jul 7, 2017Updated 8 years ago
- Running .NET from VBA☆148Feb 11, 2023Updated 3 years ago
- Set of tools to analyze Windows sandboxes for exposed attack surface.☆2,267Nov 6, 2025Updated 3 months ago
- An obfuscation tool for Windows which instruments the Windows Loader into acting as an unpacking engine.☆314Oct 18, 2018Updated 7 years ago
- Quickly debug shellcode extracted during malware analysis☆626May 23, 2023Updated 2 years ago
- ☆29Jan 15, 2021Updated 5 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆25Mar 26, 2020Updated 5 years ago
- Run Processes as PPL with ELAM☆177Mar 17, 2022Updated 3 years ago
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆374May 24, 2022Updated 3 years ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆167May 27, 2021Updated 4 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆192Mar 26, 2020Updated 5 years ago
- Dump of win32k POCs for bugs I've found☆381Mar 6, 2022Updated 3 years ago
- Security product hook detection☆327Mar 30, 2021Updated 4 years ago
- ☆101Oct 7, 2023Updated 2 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Nov 1, 2018Updated 7 years ago
- Enumerate Windows Defender threat families and dump their names according category☆93May 27, 2019Updated 6 years ago
- ☆274Jan 14, 2023Updated 3 years ago
- ☆349Mar 19, 2021Updated 4 years ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,270May 1, 2024Updated last year
- The goal of the tool is to monitor requests received by selected device objects or kernel drivers. The tool is quite similar to IrpTracke…☆408Dec 27, 2024Updated last year
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- ☆121Nov 21, 2024Updated last year
- Incident Response & Digital Forensics Debugging Extension☆389Dec 11, 2018Updated 7 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Aug 8, 2018Updated 7 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆317Oct 13, 2024Updated last year
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆135Aug 10, 2018Updated 7 years ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,330Oct 31, 2025Updated 4 months ago
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated last year
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆249Jul 9, 2024Updated last year
- ☆153Jul 31, 2022Updated 3 years ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆109May 27, 2021Updated 4 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆824Mar 10, 2022Updated 3 years ago
- Obfuscate specific windows apis with different apis☆1,021Feb 21, 2021Updated 5 years ago