360trev / PELoadFromRam
Very very useful example of loading and relocating the (Win32) DLL from memory (!) which allows many possibilities and much more flexibility to dynamically link code from many sources including realtime download from the web and also code signing!
☆21Updated 12 years ago
Alternatives and similar repositories for PELoadFromRam:
Users that are interested in PELoadFromRam are comparing it to the libraries listed below
- wow64 syscall filter☆13Updated 10 years ago
- Final Transparent encrypted version☆14Updated 8 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Updated 11 years ago
- Kernel (Ring0) - SSDT unhook driver☆14Updated 7 years ago
- ☆25Updated 4 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 8 years ago
- Sandbox d'analyse de malware pour Windows 7 avec un client TCP en mode noyau☆19Updated 9 years ago
- Ssdt Hook Detection tool☆13Updated 8 years ago
- An aggregate of tools used in the core of vmp_dbg plus other parsing utils to parse vmp bc.☆15Updated 8 years ago
- Lists work items being queued currently.☆14Updated 9 years ago
- metasploit loader with antivirus bypass module☆17Updated 8 years ago
- A tool similar to netcat, but tunneled over DNS☆18Updated 8 years ago
- eyuyan image rebuild tools source code☆13Updated 8 years ago
- Native Development Kit for Vista 64bit And Later, by me, Based on NDK Headers 1.0, by Alex Ionescu☆16Updated 9 years ago
- an efficient yet easy to use network packet builder and parser☆11Updated 7 years ago
- Miscellaneous old Exploit code and PoCs☆16Updated 7 months ago
- A c++, QT gui based memory engine☆13Updated 7 years ago
- Framework complet d'analyse de malware☆12Updated 9 years ago
- ☆13Updated 8 years ago
- use crystalCPUID to identify vt-x & amd-v☆17Updated 10 years ago
- Anti-Anti-Debugger Plugins☆19Updated 11 years ago
- windows create process with a dll load first time via LdrHook☆30Updated 8 years ago
- ☆14Updated 9 years ago
- Minifilter Driver☆15Updated 8 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago
- ☆9Updated 8 years ago
- Analysis and Modification Tool for Executables☆16Updated 6 years ago
- ☆14Updated 8 years ago
- library, which help to describe or load and execute PE files.☆12Updated 11 years ago
- A dns server that use to hijack other dns request in a wifi network for redirect to your custem http server ..☆17Updated 9 years ago