Use subProcessTag Value From TEB to identify Event Log Threads
☆88Apr 17, 2021Updated 4 years ago
Alternatives and similar repositories for Windows-EventLog-Bypass
Users that are interested in Windows-EventLog-Bypass are comparing it to the libraries listed below
Sorting:
- ☆12Feb 19, 2017Updated 9 years ago
- Windows device tree walker☆15Sep 19, 2018Updated 7 years ago
- A tool similar to netcat, but tunneled over DNS☆18Mar 10, 2017Updated 8 years ago
- PE/PE +(64bit) Viewer (Qt 5.8)☆10Aug 3, 2018Updated 7 years ago
- an efficient yet easy to use network packet builder and parser☆11Jul 3, 2017Updated 8 years ago
- Remove individual lines from Windows XML Event Log (EVTX) files☆272Apr 17, 2021Updated 4 years ago
- ☆27May 27, 2017Updated 8 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- a network filter using NDIS hook technique☆19Mar 28, 2013Updated 12 years ago
- Securing Data Analytics on Intel SGX using Randomization☆13Aug 30, 2017Updated 8 years ago
- Lists work items being queued currently.☆14Jun 7, 2015Updated 10 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Remove individual lines from Windows Event Viewer Log (EVT) files☆45Apr 17, 2021Updated 4 years ago
- ☆14Jun 27, 2017Updated 8 years ago
- ☆15Jul 22, 2024Updated last year
- ☆17Mar 3, 2016Updated 10 years ago
- Hyper-V virtual switch packet capturing extension with libpcap / Wireshark format☆13Jun 3, 2014Updated 11 years ago
- Various libraries focused on examining/parsing NTFS-specific structures☆16Oct 25, 2015Updated 10 years ago
- A command line tool to load and unload a device driver.☆46Jun 10, 2017Updated 8 years ago
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Mar 2, 2017Updated 9 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆44Oct 3, 2018Updated 7 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- ☆11Mar 11, 2015Updated 10 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- Windows Kernel Driver - Create a driver device in TDI layer of windows kernel to capture network data packets☆36Jul 21, 2014Updated 11 years ago
- ☆11Jun 15, 2017Updated 8 years ago
- Open-Source Anti-RMT-Spam Firewall☆12Mar 28, 2016Updated 9 years ago
- ☆14Feb 23, 2018Updated 8 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- 虚拟机逃逸exp工具 VMware Escape Exploit before VMware WorkStation 12.5.5☆10Sep 10, 2017Updated 8 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- Event Tracing for Windows Custom Events☆21Jan 28, 2015Updated 11 years ago
- Lua Extension for Windbg☆21Oct 22, 2018Updated 7 years ago