PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware.
☆430May 22, 2020Updated 5 years ago
Alternatives and similar repositories for PeaceMaker
Users that are interested in PeaceMaker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆722Aug 5, 2020Updated 5 years ago
- CFB is a ProcMon-style tool designed to assist capturing IRPs sent to Windows drivers.☆332Mar 26, 2024Updated 2 years ago
- Virtual Machine Introspection, Tracing & Debugging☆598Feb 22, 2022Updated 4 years ago
- CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆146Sep 5, 2020Updated 5 years ago
- Research on Windows Kernel Executive Callback Objects☆318Feb 22, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Open Course for diving security internal☆53Nov 11, 2019Updated 6 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆105May 14, 2020Updated 5 years ago
- Enumerate and disable common sources of telemetry used by AV/EDR.☆848Mar 11, 2021Updated 5 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆242Nov 6, 2019Updated 6 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆828Mar 10, 2022Updated 4 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆192Mar 26, 2020Updated 6 years ago
- Adds a user-mode asynchronous procedure call (APC) object to the APC queue of the specified thread and spoof the Parent Process.☆157Jun 10, 2019Updated 6 years ago
- This is a collection of interesting codes about Windows Process creation.☆239Jan 12, 2024Updated 2 years ago
- Obfuscate specific windows apis with different apis☆1,021Feb 21, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Just another Windows Process Injection☆409Aug 7, 2020Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,197Jul 5, 2023Updated 2 years ago
- A more stealthy variant of "DLL hollowing"☆365Mar 8, 2024Updated 2 years ago
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆244Jul 26, 2020Updated 5 years ago
- Also known by Microsoft as Knifecoat☆1,148Dec 22, 2022Updated 3 years ago
- Evade sysmon and windows event logging☆624Apr 8, 2020Updated 6 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆227Jun 9, 2020Updated 5 years ago
- Load self-signed drivers without TestSigning or disable DSE. Transferred from https://github.com/DoubleLabyrinth/Windows10-CustomKernelSi…☆789Jan 22, 2020Updated 6 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Bind Shell Using the Fax Service and a DLL Hijack☆333May 3, 2020Updated 5 years ago
- Adaptive DLL hijacking / dynamic export forwarding☆814Jul 6, 2020Updated 5 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 6 years ago
- Documentation and supporting script sample for Windows Exploit Guard☆168Sep 8, 2025Updated 7 months ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆110Apr 24, 2020Updated 6 years ago
- CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege☆337Dec 23, 2021Updated 4 years ago
- A POC for Windows Extension Host hooking☆24Jul 13, 2019Updated 6 years ago
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆58Jun 21, 2020Updated 5 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆149Feb 15, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The history of Windows Internals via symbols.☆181Nov 4, 2021Updated 4 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- AV/EDR evasion via direct system calls.☆2,008Jan 1, 2023Updated 3 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- Silencing Sysmon via driver unload☆238Oct 13, 2022Updated 3 years ago
- A memory scanning evasion technique☆901May 24, 2017Updated 8 years ago
- Kernel Pool Monitor☆128Mar 6, 2022Updated 4 years ago