HongThatCong / de4dot_mod
de4dot mod by HTC & Ngôn Nguyễn
☆20Updated 4 years ago
Related projects: ⓘ
- A kernel mode Windows rootkit in development.☆49Updated 2 years ago
- Add export function and convert exe to dll☆25Updated 4 years ago
- 参考taviso的代码逆向一下mpengine.dll☆19Updated 2 years ago
- genpatch is IDA plugin that generates a python script for patching binary☆30Updated 9 months ago
- Yet another Windows DLL injector.☆36Updated 2 years ago
- ☆11Updated this week
- AppContainerBypass☆21Updated 3 years ago
- Currently proof-of-concept☆16Updated 2 years ago
- Vulnerability analysis and proof of concepts☆30Updated last year
- POC For CVE-2022-24483☆14Updated 2 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆28Updated last year
- 从admin冲到TrustedInstaller☆16Updated last year
- Process Hollowing Packer☆25Updated 7 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆33Updated 9 years ago
- ☆12Updated 2 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆18Updated 3 years ago
- Subtract one PE file from another!☆19Updated 2 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 2 years ago
- Example for PagedOut!☆24Updated 4 years ago
- ☆11Updated this week
- A compact tool for detecting AV/EDR hooks in default Windows libraries.☆29Updated 2 years ago
- ☆19Updated this week
- ksc4cpp is a shellcode framework for windows kernel based on C++☆21Updated last year
- Wow64 Heaven's Gate Hook☆25Updated 3 years ago
- ☆15Updated this week
- Convert native dll to shellcode, and support exported function☆22Updated 3 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆19Updated 2 years ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆35Updated 2 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆59Updated 3 years ago
- A ready-made template for a project based on libpeconv.☆40Updated last year