GiovanniDicanio / ReadStringsFromRegistryLinks
C++/Win32 code to read strings from the Windows registry
☆9Updated 8 years ago
Alternatives and similar repositories for ReadStringsFromRegistry
Users that are interested in ReadStringsFromRegistry are comparing it to the libraries listed below
Sorting:
- Event Tracing for Windows Custom Events☆21Updated 10 years ago
- Some interesting code☆18Updated 10 years ago
- A MITM proxy server for reflective DLL injection through WinINet☆15Updated 7 years ago
- Class implementation of PowerLoader injection technique☆32Updated 8 years ago
- Shellcode injection using debugging APIs☆19Updated 11 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 8 years ago
- Analysis and Modification Tool for Executables☆17Updated 6 years ago
- ☆12Updated 10 years ago
- An alternative tool to Sysinternals WinObj tool (nicer icons!)☆37Updated 6 years ago
- Zerokit shared code☆17Updated 6 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Updated 11 years ago
- Simple PE packer with RtlCompressBuffer☆21Updated 9 years ago
- ☆13Updated 9 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago
- Notes my learning steps about Windows-NT☆23Updated 8 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆28Updated 11 years ago
- User-mode part of Zerokit platform☆22Updated 6 years ago
- WoW64 -> x64☆19Updated 8 years ago
- ☆33Updated 6 years ago
- Diff tool for comparing export tables in PE images☆24Updated 5 years ago
- UI application that can compare PE images in memory or in raw PE file☆18Updated 11 years ago
- find and kill injectedThreads from memory☆12Updated 9 years ago
- Reflective DLL Injection style process infector☆20Updated 7 years ago
- Anti-AV compilation☆44Updated 11 years ago
- Common Malware Techniques☆14Updated 2 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆13Updated 9 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Updated 9 years ago
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Updated 8 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Updated 11 years ago
- WhoCalls can query a directory of files, find the binaries, and search for a user specified Win API import. It and works with both 32-bit…☆18Updated 3 years ago