PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls
☆39Nov 20, 2015Updated 10 years ago
Alternatives and similar repositories for syscalltest
Users that are interested in syscalltest are comparing it to the libraries listed below
Sorting:
- Code Injector Using Code Caves☆15Jul 12, 2015Updated 10 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- ☆11Aug 28, 2024Updated last year
- Anti-AV compilation☆44Oct 4, 2013Updated 12 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- ☆22Mar 23, 2016Updated 9 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆14Mar 26, 2015Updated 10 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Mar 15, 2015Updated 10 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- ☆37May 9, 2019Updated 6 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- ☆14Apr 7, 2018Updated 7 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- browser narlyness☆50Dec 11, 2013Updated 12 years ago
- kernel pool windbg extension☆83Jul 23, 2015Updated 10 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- tiny wrapper around Windows Management Instrumentation API☆13Nov 9, 2018Updated 7 years ago
- A session-0 capable dll injection utility☆76Apr 18, 2018Updated 7 years ago
- ripPE - section extractor and profiler for PE file analysis☆33Aug 8, 2014Updated 11 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Jul 25, 2014Updated 11 years ago
- ☆17Feb 29, 2020Updated 6 years ago
- Reflective Polymorphism☆109Jun 29, 2018Updated 7 years ago
- Library for using direct system calls☆36Jan 30, 2025Updated last year
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- XED based Disassembly Engine☆21Apr 23, 2018Updated 7 years ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- ☆52Sep 15, 2016Updated 9 years ago
- Simple proof of concept code for injecting libraries on 64bit processes from a 32bit process☆96Oct 12, 2018Updated 7 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35May 7, 2015Updated 10 years ago
- ☆51Sep 18, 2020Updated 5 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Jun 11, 2015Updated 10 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 7 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Nov 4, 2017Updated 8 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- ☆48Jun 19, 2017Updated 8 years ago