Andy53 / ERC.netLinks
A collection of tools for debugging Windows application crashes.
☆18Updated 3 years ago
Alternatives and similar repositories for ERC.net
Users that are interested in ERC.net are comparing it to the libraries listed below
Sorting:
- An Xdbg Plugin of the ERC Library.☆26Updated 2 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆36Updated 4 years ago
- Small visualizator for PE files☆70Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- the Open Source and Pure C++ Packer for eXecutables☆21Updated 2 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆17Updated last year
- A simple PE loader.☆27Updated 3 years ago
- The Console Monitor Driver is a KMDF kernel-mode filter driver that captures certain Fast I/O operations (input and output) that is sent …☆41Updated 3 years ago
- Offensive RPC PoC☆88Updated 4 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆58Updated 6 months ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- Compile shellcode into an exe file from Windows or Linux.☆72Updated 8 months ago
- Rite Of Passage ROP Injector☆34Updated 6 years ago
- ☆37Updated 11 months ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Updated 2 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆57Updated last week
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- Random CVEs☆34Updated 8 months ago
- NT AUTHORITY\SYSTEM☆43Updated 5 years ago
- Embed an executable as a PE resource, drops and launches it in runtime.☆64Updated 4 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Updated 2 years ago
- Windows process injection methods☆19Updated 6 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 3 years ago
- ☆90Updated last year
- really ?☆12Updated last year
- AMSI detection PoC☆31Updated 5 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Updated 3 years ago
- A DLL that serves OutputDebugString content over a TCP connection☆35Updated 4 years ago
- ☆31Updated 5 years ago
- ☆24Updated 4 years ago