DarkCoderSc / eof-readerLinks
C++/ CLI implementation of my read EOF Data from PE File lib.
☆10Updated 5 years ago
Alternatives and similar repositories for eof-reader
Users that are interested in eof-reader are comparing it to the libraries listed below
Sorting:
- ☆18Updated 3 years ago
- A small utility to run raw code chunks in the executable memory area.☆14Updated 10 years ago
- An Assembly x86 code that shows Windows MessageBox kept as simple as possible.☆11Updated 2 years ago
- active directory query tool using LDAP Protocol , helps red teamer / penetration testers to validate users credentials , retrieve inform…☆12Updated 5 years ago
- ☆11Updated 4 years ago
- Decrypt Wireless Passwords On Windows☆14Updated 4 years ago
- Using Thread Description To Hide Shellcodes☆14Updated 2 years ago
- Debugger checks in 3 ways☆19Updated 7 years ago
- ☆20Updated 5 years ago
- Implementation of ITaskHandler in C++☆13Updated 2 years ago
- Runpe + DInvoke + Syscall☆16Updated 3 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Updated 4 years ago
- Collection of IDA helpers☆16Updated 2 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆14Updated 2 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆16Updated 2 years ago
- Analysis and Modification Tool for Executables☆16Updated 6 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆13Updated 4 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- Anti-rootkit works as a Windows system driver.☆13Updated 3 years ago
- TaskMgr Volatile Environment LPE☆13Updated 6 months ago
- module for certexfil☆15Updated 2 years ago
- D00☆6Updated 3 years ago
- Uses NASM Shell Tool from Metasploit to friendly export Python / C / CPP shellcode from assembly instructions.☆16Updated 4 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆18Updated 3 years ago
- golang String Obfuscate☆9Updated 3 years ago
- Zerokit shared code☆16Updated 6 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Detour hooking IRQ1 ISR through IDT (Interrupt Descriptor Table)☆19Updated 2 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 8 years ago