86hh / BEAUTIFULSKYLinks
☆21Updated 6 years ago
Alternatives and similar repositories for BEAUTIFULSKY
Users that are interested in BEAUTIFULSKY are comparing it to the libraries listed below
Sorting:
- ☆47Updated 5 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 3 years ago
- DirectNtApi - simple method to make ntapi function call without importing or walking export table. Work under Windows 7, 8 and 10☆53Updated last year
- An Integrity-Check Monitoring Pintool☆58Updated 4 years ago
- A research project about Windows notify routines.☆37Updated 5 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- This is a simple driver with x64 inline assembly☆57Updated 5 years ago
- ☆34Updated 7 years ago
- executing JS from x86 code☆27Updated 6 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated 2 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆61Updated last year
- drvtriks kernel driver for Windows 7 SP1 and 8.1 x64, that tricks around in your system.☆33Updated 7 years ago
- clone of armadillo patched for windows☆47Updated 10 months ago
- An API Monitor based on Instrumentation☆43Updated 7 years ago
- AMD SVM hypervisor rootkit proof of concept☆48Updated last year
- ☆17Updated 5 years ago
- ☆24Updated 4 years ago
- A set of small utilities, helpers for PIN tracers☆32Updated last year
- Command like tool to print mitigation flags for running processes in a memory dump☆47Updated 4 years ago
- Sample project for kernel debugging automation with Vagrant☆60Updated 5 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an object☆49Updated 4 years ago
- PoC for hiding PE exports☆67Updated 4 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆35Updated 4 years ago
- ☆18Updated 4 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆27Updated 2 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Updated 10 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Updated 8 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 6 years ago
- A POC for Windows Extension Host hooking☆24Updated 6 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆58Updated 9 years ago