86hh / BEAUTIFULSKYLinks
☆21Updated 6 years ago
Alternatives and similar repositories for BEAUTIFULSKY
Users that are interested in BEAUTIFULSKY are comparing it to the libraries listed below
Sorting:
- ☆49Updated 5 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 4 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆62Updated last year
- DirectNtApi - simple method to make ntapi function call without importing or walking export table. Work under Windows 7, 8 and 10☆53Updated last year
- IDA script for vmprotect Windows Api address decoder☆52Updated 4 years ago
- A set of small utilities, helpers for PIN tracers☆35Updated 2 months ago
- An Integrity-Check Monitoring Pintool☆58Updated 5 years ago
- ☆34Updated 8 years ago
- Asus AsIO2 Local Privilege Escalation exploit (based on ReWolf's MSI exploit)☆14Updated 5 years ago
- ☆17Updated 5 years ago
- Binary Ninja plugin to perform automated analysis of Windows drivers☆18Updated 6 years ago
- executing JS from x86 code☆27Updated 6 years ago
- ☆24Updated 4 years ago
- My articles for Paged Out! #2☆17Updated 6 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆36Updated 4 years ago
- ☆28Updated 5 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 8 years ago
- drvtriks kernel driver for Windows 7 SP1 and 8.1 x64, that tricks around in your system.☆33Updated 8 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆79Updated 10 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Updated 8 years ago
- clone of armadillo patched for windows☆48Updated last year
- This is a simple driver with x64 inline assembly☆57Updated 5 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an object☆50Updated 4 years ago
- PoC for hiding PE exports☆67Updated 4 years ago
- Currently proof-of-concept☆17Updated 3 years ago
- ☆34Updated 4 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆57Updated 9 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆74Updated 2 years ago
- vmware-backdoor☆33Updated 4 years ago
- Command like tool to print mitigation flags for running processes in a memory dump☆47Updated 5 years ago