NtRaiseHardError / Antimalware-Research
Research on Anti-malware and other related security solutions
☆259Updated 4 years ago
Alternatives and similar repositories for Antimalware-Research:
Users that are interested in Antimalware-Research are comparing it to the libraries listed below
- This is a simple example and explanation of obfuscating API resolution via hashing☆232Updated 4 years ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆585Updated 2 years ago
- Demos of various (also non standard) persistence methods used by malware☆219Updated last year
- Universal Unhooking☆316Updated 6 years ago
- ☆480Updated 4 years ago
- Extract Windows Defender database from vdm files and unpack it☆433Updated 4 years ago
- ☆131Updated last year
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆217Updated last year
- PoC Thread Execution Hijacking for Win32 Code Injection☆174Updated 5 months ago
- A more stealthy variant of "DLL hollowing"☆339Updated 10 months ago
- Tools for instrumenting Windows Defender's mpengine.dll☆288Updated 6 years ago
- A kernel rootkit with remote command and control interface for windows☆108Updated 6 years ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆689Updated 4 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆241Updated 4 years ago
- ☆802Updated 5 years ago
- Canadian Furious Beaver is a ProcMon-style tool designed only for capturing IRPs sent to any Windows driver.☆312Updated 9 months ago
- PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware.☆418Updated 4 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆178Updated 2 years ago
- Just another Windows Process Injection☆390Updated 4 years ago
- An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security☆318Updated 7 years ago
- Reverse engineered source code of the autochk rootkit☆199Updated 5 years ago
- A way to delete a locked file, or current running executable, on disk.☆508Updated 5 months ago
- Phantom DLL hollowing PoC☆351Updated 2 years ago
- AndrewSpecial, dumping lsass' memory stealthily and bypassing "Cilence" since 2019.☆383Updated 5 years ago
- An extensible framework for easily writing compiler optimized position independent x86 / x64 shellcode for windows platforms.☆501Updated 5 years ago
- Local privilege escalation PoC exploit for CVE-2019-16098☆194Updated 5 years ago
- Set of antianalysis techniques found in malware☆129Updated last year
- Process Doppelgänging☆155Updated 7 years ago
- Live hunting of code injection techniques☆378Updated 5 years ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆522Updated 10 months ago