Cr4sh / PTBypass-PoCView external linksLinks
Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.
☆79Jan 24, 2011Updated 15 years ago
Alternatives and similar repositories for PTBypass-PoC
Users that are interested in PTBypass-PoC are comparing it to the libraries listed below
Sorting:
- Hidden kernel mode code execution for bypassing modern anti-rootkits.☆84Dec 23, 2010Updated 15 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Oct 27, 2011Updated 14 years ago
- An analytical debugger programmed in C++, using Qt.☆22May 20, 2012Updated 13 years ago
- ☆10Sep 29, 2019Updated 6 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Aug 12, 2015Updated 10 years ago
- A kernel level anti-rootkit tool which runs on the windows platform.☆92Apr 18, 2014Updated 11 years ago
- Windows kernel-mode callbacks tutorial driver☆48Aug 8, 2016Updated 9 years ago
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Apr 10, 2015Updated 10 years ago
- The dll that can hide itself and then delete itselft.☆32Mar 31, 2013Updated 12 years ago
- hypervisor in windows device driver by intel vt☆14Aug 25, 2018Updated 7 years ago
- ☆19Jul 20, 2015Updated 10 years ago
- Windows anti-rootkit library☆37Mar 15, 2015Updated 10 years ago
- Minifilter Driver☆15Feb 10, 2017Updated 9 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆24Apr 10, 2013Updated 12 years ago
- Modify process handle permissions☆61Nov 30, 2016Updated 9 years ago
- Kernel mode driver loader, injecting into the windows kernel, Rootkit. Driver injections.☆48Nov 9, 2014Updated 11 years ago
- Test code only. Not suitable for actual use.☆96Apr 19, 2015Updated 10 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- A C/C++ code obfuscator based on llvm/clang technology☆16Sep 19, 2014Updated 11 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆183Nov 30, 2017Updated 8 years ago
- OllyCallTrace is a plugin for OllyDbg to trace the call chain of a thread.☆54Nov 4, 2011Updated 14 years ago
- Examples for detection of hidden processes on windows☆35Jun 11, 2014Updated 11 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- analyze the content of the pe file on windows, and shell(pack) function for windows drivers.☆11Nov 9, 2018Updated 7 years ago
- Today Plugin (x64) - A Plugin For x64dbg☆13Jul 17, 2018Updated 7 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- ☆117Nov 11, 2012Updated 13 years ago
- A sample on how to inject a DLL from a kernel driver☆61Sep 13, 2016Updated 9 years ago
- Kernel debugger using Intel VT-x. Designed to be compatible with linux, ucore, windows.☆28Jun 12, 2013Updated 12 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22May 31, 2017Updated 8 years ago
- Windows Kernel Driver with C++ runtime☆181Sep 26, 2020Updated 5 years ago
- Enumerates very, very large directories quickly by directly using kernel syscalls. For POSIX and Windows. WARNING THIS IS OBSOLETE. USE B…☆15Aug 13, 2014Updated 11 years ago
- PE/PE +(64bit) Viewer (Qt 5.8)☆10Aug 3, 2018Updated 7 years ago
- ☆13Aug 12, 2015Updated 10 years ago
- Debugger extension for the Debugging Tools for Windows (WinDbg, KD, CDB, NTSD).☆69Nov 14, 2016Updated 9 years ago
- Decompile an x86 exe, and read PE infos.☆19Sep 29, 2018Updated 7 years ago