GiovanniDicanio / ReadStringsFromRegistry
C++/Win32 code to read strings from the Windows registry
☆8Updated 8 years ago
Alternatives and similar repositories for ReadStringsFromRegistry:
Users that are interested in ReadStringsFromRegistry are comparing it to the libraries listed below
- ☆18Updated 5 years ago
- v1版完成对PE头,区段,输入表的解析☆9Updated 6 years ago
- Simple error lookup for Win32 and NTSTATUS errors☆17Updated 6 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆10Updated 9 years ago
- Event Tracing for Windows Custom Events☆21Updated 9 years ago
- Debugger checks in 3 ways☆18Updated 6 years ago
- My commands and scripts extending WinDbg☆29Updated last month
- Some interesting code☆18Updated 10 years ago
- PowerShell interpreter for unmanaged (non CLI) C++ projects☆16Updated 7 years ago
- A tool to investigate the Windows device manager☆14Updated 5 years ago
- Lists work items being queued currently.☆13Updated 9 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆13Updated 10 years ago
- Capture Webcam Reflective Dll☆8Updated 8 years ago
- Headers for linking your software with ntdll.dll☆15Updated 4 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 8 years ago
- DLL Injection commandline utility☆26Updated 11 years ago
- ☆11Updated 9 years ago
- UI application that can compare PE images in memory or in raw PE file☆17Updated 10 years ago
- simple plugin for lastest olly versions to display the callstack☆16Updated 11 years ago
- does reflective dll injection☆8Updated 10 years ago
- A project dedicated towards researching the Windows operating system's kernel mode enviornment.☆8Updated 9 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 7 years ago
- ☆28Updated 9 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- Analysis and Modification Tool for Executables☆16Updated 5 years ago
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Updated 7 years ago
- Decompile an x86 exe, and read PE infos.☆19Updated 6 years ago
- use crystalCPUID to identify vt-x & amd-v☆16Updated 9 years ago