A Practical example of ELAM (Early Launch Anti-Malware)
☆36Nov 12, 2021Updated 4 years ago
Alternatives and similar repositories for elam
Users that are interested in elam are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17May 7, 2025Updated 10 months ago
- ☆23May 28, 2021Updated 4 years ago
- hooking KiUserApcDispatcher☆27Apr 3, 2017Updated 8 years ago
- Click Once + App Domain☆67Feb 23, 2026Updated last month
- silence file system monitoring components by hooking their minifilters☆61Jan 31, 2024Updated 2 years ago
- C Header Only Library for Virii☆11Nov 17, 2020Updated 5 years ago
- PsSetCreateProcessNotifyRoutine/Ex/Ex2 hook☆13May 30, 2024Updated last year
- Run Processes as PPL with ELAM☆177Mar 17, 2022Updated 4 years ago
- Detect VM and Hypervisor☆10Jun 16, 2021Updated 4 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- Protect a process from code injection, termination and hooking☆49Jul 16, 2021Updated 4 years ago
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆172May 17, 2023Updated 2 years ago
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆134May 17, 2023Updated 2 years ago
- A mini filter driver development framework allows you to develop minit filter driver with different features.☆69Jan 25, 2026Updated last month
- ☆84Aug 26, 2024Updated last year
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Nov 17, 2019Updated 6 years ago
- This is the AV ("protection solution") used for my windows 10 rootkit main project. this includes the installer stager program, a service…☆13May 2, 2024Updated last year
- ☆21Feb 18, 2025Updated last year
- NT AUTHORITY\SYSTEM☆44Jul 8, 2020Updated 5 years ago
- A POC for Windows Extension Host hooking☆24Jul 13, 2019Updated 6 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53May 21, 2020Updated 5 years ago
- windows kernel pagehook☆42Oct 30, 2022Updated 3 years ago
- ☆59Jun 8, 2022Updated 3 years ago
- ☆22Jul 10, 2020Updated 5 years ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- PoC capable of detecting manual syscalls from usermode.☆207Nov 13, 2025Updated 4 months ago
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆97Sep 26, 2019Updated 6 years ago
- Get your data from the resource section manually, with no need for windows apis☆67Oct 22, 2024Updated last year
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- The Windows Kernel Programming book samples☆670Sep 25, 2023Updated 2 years ago
- A Windows kernel driver unit testing framework. Provides a macro free modern cpp syntax. Includes tools for automatic running on your vm.☆11May 15, 2023Updated 2 years ago
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆43Jun 10, 2025Updated 9 months ago
- Function hooks in Windows NT Kernel☆27Oct 13, 2020Updated 5 years ago
- Six cases demonstrating methods of optimizing GetProcAddress☆19Jan 3, 2022Updated 4 years ago
- A collection of scripts used to support an OffSecOps pipeline.☆15Jan 31, 2021Updated 5 years ago