Iamgublin / C-and-assembleLinks
☆25Updated 4 years ago
Alternatives and similar repositories for C-and-assemble
Users that are interested in C-and-assemble are comparing it to the libraries listed below
Sorting:
- A library that allows hook any imported function from the IAT (works only in x64)☆11Updated 6 years ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago
- reverse win7 32bit hotpatch implement☆9Updated 11 years ago
- Basic Injector running on x64 machines that is able to load into x64 AND x86 processes☆21Updated 6 years ago
- 锁主页驱动☆37Updated 6 years ago
- A c++, QT gui based memory engine☆13Updated 7 years ago
- windows kernel File redirection☆20Updated 10 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆17Updated 10 years ago
- ☆14Updated 9 years ago
- Ssdt Hook Detection tool☆13Updated 8 years ago
- PE Infector/Cryptor source code☆15Updated 8 years ago
- copy of tdifw lib☆10Updated 7 years ago
- ☆32Updated 6 years ago
- Some of example code that I have collected while learning☆10Updated 8 years ago
- A collection of Windows Administrator tools☆17Updated 11 years ago
- ☆23Updated 7 years ago
- meta op for pe file☆11Updated 8 years ago
- 进程保护、进程过滤的小工程、主要亮点是在内核中对操作系统中的用户进行管理☆16Updated 10 years ago
- a sandbox project by sudami☆17Updated 6 years ago
- ☆13Updated 6 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆28Updated 7 years ago
- ☆14Updated 8 years ago
- just an lite AntiRootkit for interesting☆23Updated 9 years ago
- Kernel-mode file scanner☆18Updated 6 years ago
- ☆33Updated 4 years ago
- Final Transparent encrypted version☆14Updated 8 years ago
- ☆27Updated 6 years ago
- You don't need install any wdk for development kernel driver☆24Updated 6 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago
- ☆12Updated 7 years ago