Assembly API block that uses CRC32 for resolving Windows API function addresses
☆18May 19, 2023Updated 2 years ago
Alternatives and similar repositories for crc32_api
Users that are interested in crc32_api are comparing it to the libraries listed below
Sorting:
- Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.☆84May 3, 2023Updated 2 years ago
- Simple tool that allows add custom function (with custom dll) to PE-file import section☆11Apr 23, 2019Updated 6 years ago
- the assembly shell and backdoor Trojan☆18Dec 19, 2021Updated 4 years ago
- RunPE Code Injection☆21Dec 16, 2025Updated 2 months ago
- ☆34Aug 7, 2023Updated 2 years ago
- Custom THP Dropper☆26Mar 27, 2018Updated 7 years ago
- Metasploit Framework☆31Jan 30, 2020Updated 6 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35May 8, 2023Updated 2 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- Extended Process List (Search functionality)☆29Jan 23, 2021Updated 5 years ago
- Polymorphic Stub Creator☆34Jun 11, 2017Updated 8 years ago
- This is a compiled cheatsheet from my experience of OSCP 2023 journey. Won't say it is all-rounded but a good starting point if you wanna…☆14Oct 17, 2024Updated last year
- TLS Examples in Schannel and IO Completion Ports☆10Jun 21, 2022Updated 3 years ago
- PoC executable packer using resources☆31Sep 29, 2016Updated 9 years ago
- Process Hollowing demonstration & explanation☆36Feb 25, 2021Updated 5 years ago
- Suite of Shellcode Running Utilities☆113Jan 30, 2020Updated 6 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆38Jul 15, 2021Updated 4 years ago
- nmap service and application version detection使用nmap的指纹库进行版本识别☆34Nov 26, 2020Updated 5 years ago
- This project is a lightweight wrapper for interacting with WMI using python/ctypes☆38Apr 6, 2019Updated 6 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆39Nov 18, 2021Updated 4 years ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆41Aug 15, 2024Updated last year
- Go bindings for the Brotli compression library (fork of kothar/brotli-go)