Idov31 / UdpInspector
Listing UDP connections with remote address without sniffing.
☆30Updated last year
Alternatives and similar repositories for UdpInspector:
Users that are interested in UdpInspector are comparing it to the libraries listed below
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆41Updated last year
- A simple PE loader.☆25Updated 2 years ago
- Process Hollowing demonstration & explanation☆35Updated 4 years ago
- ☆37Updated last year
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping☆53Updated 2 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- Enabled / Disable LSA Protection via BYOVD☆66Updated 3 years ago
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆26Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- Process Injection: APC Injection☆29Updated 4 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- ☆29Updated last year
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- ☆25Updated 2 years ago
- using the gpu to hide your payload☆55Updated 2 years ago
- Manually perform syscalls without going through any external API or DLL.☆18Updated last year
- A compact tool for detecting AV/EDR hooks in default Windows libraries.☆31Updated 2 years ago
- Threadless injection via TLS callbacks☆16Updated 3 months ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆26Updated 7 months ago
- the Open Source and Pure C++ Packer for eXecutables☆18Updated last year
- A Practical example of ELAM (Early Launch Anti-Malware)☆32Updated 3 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- ☆83Updated 9 months ago
- ☆37Updated 3 weeks ago
- Next gen process injection technique☆44Updated 4 years ago
- Clone running process with ZwCreateProcess☆57Updated 4 years ago
- ☆106Updated 2 years ago
- An example of COM hijacking using a proxy DLL.☆28Updated 3 years ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆30Updated 8 months ago