JusticeRage / hash-libraryLinks
A fork from http://create.stephan-brumme.com/hash-library/.
☆15Updated last year
Alternatives and similar repositories for hash-library
Users that are interested in hash-library are comparing it to the libraries listed below
Sorting:
- Scanning and identifying XOR encrypted PE files in PE resources☆28Updated 11 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 8 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Updated 9 years ago
- Simple tool for unpacking packed/protected malware executables.☆33Updated 13 years ago
- ☆33Updated 6 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Updated 9 years ago
- Anti-AV compilation☆44Updated 11 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36Updated 9 years ago
- ☆16Updated 7 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 9 years ago
- ☆13Updated 8 years ago
- find and kill injectedThreads from memory☆12Updated 9 years ago
- Analysis and Modification Tool for Executables☆17Updated 6 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Updated 4 years ago
- User-mode hook bypassing method☆33Updated 8 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Updated 11 years ago
- Code Injector Using Code Caves☆15Updated 10 years ago
- windows create process with a dll load first time via LdrHook☆30Updated 8 years ago
- Detect HTTP packet and inject redirect packet☆14Updated 7 years ago
- it's a simple LKM rootkit.☆12Updated 9 years ago
- Code Injection technique written in cpp language☆32Updated 7 years ago
- Engine for communication with remote kernel debugger (KD, WinDbg) from drivers and applications☆37Updated 12 years ago
- Demonstrate the new FileDispositionInfoEx behavior☆14Updated 7 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Updated 11 years ago
- IDA Pro plug-in and tools for displaying 3D graphs of procedures using UbiGraph☆26Updated 12 years ago
- 🐧 A simple kernel-level rootkit☆20Updated 9 years ago
- injects a DLL into a running process or starts a process with DLL being the very first one imported.☆35Updated 12 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- An experimental rootkit for Android☆26Updated 12 years ago
- Bootkits Revisited☆40Updated 11 years ago