☆12Oct 19, 2024Updated last year
Alternatives and similar repositories for PEB-Redirection
Users that are interested in PEB-Redirection are comparing it to the libraries listed below
Sorting:
- ☆11May 5, 2024Updated last year
- ☆28Oct 19, 2024Updated last year
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆34Jun 23, 2024Updated last year
- A unique introduction to native runtime obfuscation.☆75Mar 2, 2025Updated last year
- ☆130Oct 19, 2024Updated last year
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Apr 21, 2025Updated 10 months ago
- Stealer malware written in C++☆15Sep 7, 2024Updated last year
- One of the best Grabbers to get the Passwords, Cookies and tokens from your friends ;)☆10Aug 29, 2023Updated 2 years ago
- Exodus and Atomic crypto wallets app.asar injection POC (captures mnemonic and password) for educational purposes only.☆24Jul 3, 2024Updated last year
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Sep 24, 2022Updated 3 years ago
- sync NIST's National Vulnerability Database into a local sqlite3 database☆14Apr 27, 2013Updated 12 years ago
- Carbon Black - LastLine Binary Detonation Connector☆11May 22, 2023Updated 2 years ago
- 1.19.3 lunar client *utility* client that uses lunar client builtin features☆13Jun 3, 2024Updated last year
- A thin C# object-oriented wrapper around openxr using Valve openvr implementation☆25Nov 8, 2022Updated 3 years ago
- ☆13Sep 19, 2024Updated last year
- Proof of Concept example for abusing Process Hacker 2 (v2.39.124)☆23Oct 30, 2024Updated last year
- PowerShell module containing commands to easily interact with the Cybereason API.☆16Jan 4, 2026Updated 2 months ago
- Golang bindings for the Binary Ninja Arm64 Disassembler.☆14Mar 10, 2026Updated last week
- Registers Vectored Exception Handlers by directly manipulating internal LdrpVectorHandlerList structure instead of calling RtlAddVectored…☆35Jan 18, 2026Updated 2 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 10 months ago
- ☆21Jan 8, 2026Updated 2 months ago
- Utilizing DLang For Offensive Operations.☆14May 29, 2025Updated 9 months ago
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆25May 7, 2025Updated 10 months ago
- Enable-All-Tokens is a Go-based project designed to adjust and enable a list of specified privileges for the current process token on a W…☆10Apr 21, 2025Updated 10 months ago
- Disable threat tracing from the kernel..☆14Apr 8, 2022Updated 3 years ago
- Hunter Javascript obfuscator written in Go☆13May 20, 2022Updated 3 years ago
- C++ function and PoC using Windows API to get the base address of a process (useful to then use pointers from base)☆20Feb 4, 2017Updated 9 years ago
- Near compile-time string obfuscation for Golang☆13Oct 3, 2023Updated 2 years ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 10 months ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 10 months ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆32Dec 30, 2020Updated 5 years ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆103Apr 27, 2025Updated 10 months ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- This utility allows you to lock every available memory regions of an arbitrary process into its working set.☆69May 6, 2023Updated 2 years ago
- A simple emulator for Windows designed for reverse engineering, testing binary files, and execution logging.☆54Jul 6, 2025Updated 8 months ago
- Reverse engineering malware samples☆16Dec 3, 2021Updated 4 years ago
- Some of CrackMes made by me :)☆18Dec 24, 2021Updated 4 years ago
- I am not responsible for what is done with this project. This tool is solely written to be studied by other security researchers to see h…☆22Dec 24, 2023Updated 2 years ago