My articles for Paged Out! #2
☆17Nov 20, 2019Updated 6 years ago
Alternatives and similar repositories for PagedOut2
Users that are interested in PagedOut2 are comparing it to the libraries listed below
Sorting:
- Undocumented NsiAllocateAndGetTable usage in GetTcpTableInternal reverse engineered on Win7 X64☆20Apr 7, 2018Updated 7 years ago
- ☆21Jan 7, 2019Updated 7 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- executing JS from x86 code☆27May 9, 2019Updated 6 years ago
- Kernel mode windows NT API logger☆22Sep 9, 2019Updated 6 years ago
- User-mode part of Zerokit platform☆22Mar 30, 2019Updated 6 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆62Nov 18, 2020Updated 5 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- Figuring out the cause of a handle downgrade☆24Dec 13, 2022Updated 3 years ago
- Open-source SMB filesystem driver for Windows☆49Oct 27, 2019Updated 6 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 6 years ago
- Windows DLL Loading Utility☆12Jun 11, 2020Updated 5 years ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- ☆68Dec 17, 2020Updated 5 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- Allows you to parse all messages sent to DbgPrint without any process interaction.☆32Apr 8, 2020Updated 5 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- exploit development☆49Mar 14, 2018Updated 7 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- ☆16Dec 14, 2017Updated 8 years ago
- Self-modifying Code de-obfuscation☆17May 17, 2017Updated 8 years ago
- ☆12Aug 2, 2017Updated 8 years ago
- win32/x64 obfuscate framework☆33Apr 16, 2019Updated 6 years ago
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago
- ShellcodeVM☆15Jun 20, 2016Updated 9 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- ☆90Oct 17, 2020Updated 5 years ago
- Library for using direct system calls☆36Jan 30, 2025Updated last year
- by others☆40Jan 28, 2018Updated 8 years ago
- simply manual map any system image☆18Feb 1, 2021Updated 5 years ago
- ETW Tracing C++ project☆16Oct 2, 2020Updated 5 years ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 6 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Mar 30, 2019Updated 6 years ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago