0xZ0F / CPPMemory
Code that can be used as a reference, library, or inspiration for hacking Windows memory.
☆50Updated 4 years ago
Alternatives and similar repositories for CPPMemory:
Users that are interested in CPPMemory are comparing it to the libraries listed below
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- ☆35Updated 5 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 3 years ago
- A repository where I share my injection implemintations☆29Updated 4 years ago
- Analyze and attack windows applications using dll hijacking vulnerabilities☆56Updated 5 years ago
- Antivirus Emulator Fingerprints☆27Updated 6 years ago
- Kernel mode windows NT API logger☆22Updated 5 years ago
- DLL Injection Library & Tools☆72Updated 8 years ago
- ☆31Updated 4 years ago
- ☆49Updated 4 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆28Updated 3 years ago
- ☆22Updated 4 years ago
- Rite Of Passage ROP Injector☆34Updated 5 years ago
- PoC for hiding PE exports☆66Updated 4 years ago
- PoC for detecting and dumping process hollowing code injection☆51Updated 6 years ago
- Exploits I've authored☆60Updated 5 years ago
- Gozi-MBR-rootkit Bootkit Modified☆68Updated 8 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆39Updated 5 months ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 6 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- Sysmon shenanigans☆65Updated 4 years ago
- A small library helping to parse commandline parameters (for C/C++)☆54Updated last year
- ☆22Updated 4 years ago
- Blog posts☆30Updated 4 years ago
- Process Hollowing Detection on a live system☆13Updated 7 years ago
- Recreating and reviewing the Windows persistence methods☆37Updated 3 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- ☆16Updated 3 years ago