JamzyWang / HashCollectorLinks
General hash functions
☆12Updated 10 years ago
Alternatives and similar repositories for HashCollector
Users that are interested in HashCollector are comparing it to the libraries listed below
Sorting:
- automates exploits using ROP chains, using ntdll-scraper☆16Updated 3 years ago
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆14Updated 2 years ago
- Subtract one PE file from another!☆20Updated 4 years ago
- Hooking Heavens Gate in a weekend☆13Updated 4 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Updated 3 years ago
- ☆33Updated 4 years ago
- Code Integrity Violation Spotter☆17Updated last year
- ☆26Updated 2 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Updated 2 years ago
- Open-source EDR kernel-component for system monitoring and DLL injection☆33Updated 5 years ago
- A working version of this tutorial: https://docs.microsoft.com/en-us/windows/desktop/rpc/tutorial☆16Updated 6 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆25Updated 2 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Updated 5 years ago
- An attempt at reversing WindowsDefender☆20Updated last year
- ☆16Updated 3 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Updated 4 years ago
- Extended library for using direct system calls on windows☆17Updated 4 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21Updated 4 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Updated 4 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Updated 3 years ago
- Example for PagedOut!☆25Updated 6 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 4 years ago
- Yet another Windows DLL injector.☆40Updated 4 years ago
- ☆26Updated 3 years ago
- Basic utilities for executing, reading and writing 64-bit data in a 32-bit WoW64 process☆19Updated 3 years ago
- ☆16Updated 11 years ago
- ☆20Updated 5 years ago
- Infects PE files with a shellcode☆22Updated 7 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Updated 7 years ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆37Updated 5 years ago