Kur0N3k0 / ThemidaProcmonLinks
After Process monitor, execute Themida
☆15Updated 8 years ago
Alternatives and similar repositories for ThemidaProcmon
Users that are interested in ThemidaProcmon are comparing it to the libraries listed below
Sorting:
- Handy WMI query tool.☆12Updated 9 years ago
- just an lite AntiRootkit for interesting☆23Updated 9 years ago
- User-mode kernel callback framework☆10Updated 11 years ago
- A c++, QT gui based memory engine☆13Updated 7 years ago
- Hidden module/dll detector for windows apps☆15Updated 8 years ago
- A library that allows hook any imported function from the IAT (works only in x64)☆11Updated 6 years ago
- XDK is a fully featured C++ wrapper library for Windows kernel development☆20Updated 9 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Updated 10 years ago
- Ssdt Hook Detection tool☆13Updated 8 years ago
- ☆17Updated 8 years ago
- ☆24Updated 7 years ago
- Native Development Kit for Vista 64bit And Later, by me, Based on NDK Headers 1.0, by Alex Ionescu☆17Updated 9 years ago
- Lists work items being queued currently.☆14Updated 10 years ago
- A driverless driver that is supposed to be manually mapped, usually by using TDL exploit. The driver shows how to read/write to any proce…☆22Updated 7 years ago
- Decompile an x86 exe, and read PE infos.☆19Updated 6 years ago
- ☆14Updated 8 years ago
- MIR-Engine☆24Updated 8 years ago
- ☆14Updated 7 years ago
- WIP - Play with Intel VM Extensions☆21Updated 8 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆25Updated 11 years ago
- some classes which can help me to program kernel driver in Windows.☆16Updated 7 years ago
- ☆15Updated 8 years ago
- Examples for detection of hidden processes on windows☆34Updated 11 years ago
- Spoof Windows Test Signing Mode☆29Updated 6 years ago
- An analytical debugger programmed in C++, using Qt.☆21Updated 13 years ago
- ☆14Updated 8 years ago
- User-mode program parsing logs created by HyperPlatform☆18Updated 9 years ago
- ☆14Updated 8 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago
- Modifies the code of the RtlUserThreadStart callback and reads the arguments passed to it. Then it changes the initial execution argument…☆14Updated 7 years ago