0xZ0F / CPPMemoryLinks
Code that can be used as a reference, library, or inspiration for hacking Windows memory.
☆53Updated 5 years ago
Alternatives and similar repositories for CPPMemory
Users that are interested in CPPMemory are comparing it to the libraries listed below
Sorting:
- ☆37Updated 6 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆55Updated 4 months ago
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
- DLL Injection Library & Tools☆73Updated 9 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆45Updated 4 years ago
- ☆50Updated 5 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Updated 5 years ago
- Kernel mode windows NT API logger☆22Updated 6 years ago
- Antivirus Emulator Fingerprints☆29Updated 7 years ago
- Sysmon shenanigans☆66Updated 5 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Updated 7 years ago
- Process reimaging proof of concept code☆96Updated 6 years ago
- PoC designed to evade userland-hooking anti-virus.☆90Updated 6 years ago
- Exploits I've authored☆60Updated 6 years ago
- PoC for hiding PE exports☆67Updated 4 years ago
- A small library helping to parse commandline parameters (for C/C++)☆58Updated 6 months ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆99Updated 4 years ago
- C++☆80Updated 9 years ago
- Gozi-MBR-rootkit Bootkit Modified☆71Updated 9 years ago
- A simple rootkit to hide a process☆47Updated 11 years ago
- ☆46Updated 7 years ago
- ☆31Updated 5 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆44Updated 8 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆94Updated 7 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- Execute an arbitrary command within the context of another process☆21Updated 6 years ago
- ☆16Updated 4 years ago
- Shim database persistence (Fin7 TTP)☆37Updated 5 years ago