EgeBalci / Cminer
Cminer is a tool for enumerating the code caves in PE files.
☆148Updated last year
Alternatives and similar repositories for Cminer:
Users that are interested in Cminer are comparing it to the libraries listed below
- Search for code cave in all binaries☆278Updated 8 months ago
- Pazuzu: Reflective DLL to run binaries from memory☆214Updated 4 years ago
- Fork of mona.py with x64dbg support☆102Updated 2 years ago
- Demos of various (also non standard) persistence methods used by malware☆221Updated 2 years ago
- A tool to detect and crash Cuckoo Sandbox☆292Updated 8 months ago
- Patching ROP-encoded shellcodes into PEs☆184Updated 7 years ago
- Teaching old shellcode new tricks☆205Updated 7 years ago
- FLARE Kernel Shellcode Loader☆176Updated 5 years ago
- some pocs for antivirus evasion☆130Updated last year
- a tool to make it easy and fast to test various forms of injection☆172Updated 5 years ago
- An attempt at Process Doppelgänging☆182Updated 7 years ago
- simple shellcode generator☆112Updated 8 years ago
- Miscellaneous tools written in Python, mostly centered around shellcodes.☆146Updated 9 years ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆281Updated 7 years ago
- Platform independent peCloak fork based on Capstone☆103Updated 9 years ago
- A list of ways to execute code on Windows using legitimate Windows tools☆306Updated 5 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 7 years ago
- This is a **WIP** tool that performs shellcode obfuscation in x86 instruction set.☆236Updated 8 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆182Updated 5 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆220Updated 2 years ago
- Universal Unhooking☆319Updated 6 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆135Updated 7 years ago
- This is a simple example and explanation of obfuscating API resolution via hashing☆237Updated 4 years ago
- ☆113Updated 8 years ago
- A C/C++ implementation of Microsoft's Antimalware Scan Interface☆178Updated 6 years ago
- ☆140Updated 7 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆175Updated 7 months ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆151Updated 4 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆127Updated 8 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆145Updated 7 years ago