Iamgublin / C-and-assemble
☆25Updated 4 years ago
Alternatives and similar repositories for C-and-assemble:
Users that are interested in C-and-assemble are comparing it to the libraries listed below
- windows kernel File redirection☆20Updated 10 years ago
- A library that allows hook any imported function from the IAT (works only in x64)☆11Updated 5 years ago
- 锁主页驱动☆37Updated 6 years ago
- reverse win7 32bit hotpatch implement☆9Updated 11 years ago
- just an lite AntiRootkit for interesting☆23Updated 9 years ago
- Some of example code that I have collected while learning☆10Updated 8 years ago
- PE Infector/Cryptor source code☆15Updated 8 years ago
- ☆20Updated 7 years ago
- ☆31Updated 6 years ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago
- 进程保护、进程过滤的小工程、主要亮点是在内核中对操作系统中的用户进行管理☆15Updated 10 years ago
- Kernel-mode file scanner☆18Updated 6 years ago
- meta op for pe file☆11Updated 8 years ago
- ☆14Updated 8 years ago
- ☆14Updated 9 years ago
- ☆23Updated 7 years ago
- Ssdt Hook Detection tool☆13Updated 8 years ago
- Automatically exported from code.google.com/p/guardlite☆11Updated 9 years ago
- A collection of Windows Administrator tools☆17Updated 11 years ago
- network filter driver that control network send speed, based on windows tdi framework.☆31Updated last year
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆17Updated 10 years ago
- ☆12Updated 9 months ago
- Dark Cloud Virus☆7Updated 7 years ago
- Sandbox d'analyse de malware pour Windows 7 avec un client TCP en mode noyau☆19Updated 9 years ago
- a sandbox project by sudami☆17Updated 6 years ago
- Windows device tree walker☆15Updated 6 years ago
- ☆33Updated 4 years ago
- User-mode kernel callback framework☆10Updated 11 years ago
- ☆12Updated 7 years ago