Program to leak anti-virus behaviour and such
☆14Apr 18, 2019Updated 6 years ago
Alternatives and similar repositories for LeakMyAV
Users that are interested in LeakMyAV are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Nov 4, 2017Updated 8 years ago
- Reflective DLL Injection style process infector☆20Jul 23, 2018Updated 7 years ago
- Dodgy reflective DLL injector PoC for 32-bit Windows☆17Aug 20, 2018Updated 7 years ago
- Protects deletion of files with a specified extension using a kernel-mode driver.☆76Jul 16, 2018Updated 7 years ago
- Hyper-V virtual switch packet capturing extension with libpcap / Wireshark format☆13Jun 3, 2014Updated 11 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago
- PoC designed to evade userland-hooking anti-virus.☆90May 15, 2019Updated 6 years ago
- Complete environement for network injected reversing☆21Dec 25, 2016Updated 9 years ago
- PoC for detecting and dumping process hollowing code injection☆53Oct 23, 2018Updated 7 years ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Oct 13, 2021Updated 4 years ago
- Introductory software reverse engineering tutorial for beginners☆36Jun 2, 2019Updated 6 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- Code Injector Using Code Caves☆15Jul 12, 2015Updated 10 years ago
- A MITM proxy server for reflective DLL injection through WinINet☆16May 1, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆18Jan 9, 2023Updated 3 years ago
- Simple header only library to change return address on current stack frame.☆22Sep 4, 2016Updated 9 years ago
- windows create process with a dll load first time via LdrHook☆31Oct 21, 2016Updated 9 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆44Oct 3, 2018Updated 7 years ago
- Dll injector POC for new handle stealing technique☆21Oct 8, 2017Updated 8 years ago
- ☆19Jul 20, 2015Updated 10 years ago
- Kernel-mode file scanner☆19Jul 16, 2018Updated 7 years ago
- Optimized software implementation in C of the RC4 encryption algorithm.☆15Mar 4, 2013Updated 13 years ago
- library, which help to describe or load and execute PE files.☆55Jun 23, 2013Updated 12 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Detect HTTP packet and inject redirect packet☆14Mar 1, 2018Updated 8 years ago
- Cross platform C++ template-based IPC library.☆11Jul 14, 2022Updated 3 years ago
- ☆13Jun 5, 2018Updated 7 years ago
- A tool to dump informations about the caller of a function.☆14Oct 4, 2016Updated 9 years ago
- Network monitor for Linux☆13Aug 11, 2019Updated 6 years ago
- ☆14Feb 14, 2018Updated 8 years ago
- Load and unload a DLL into an remote process without using WriteProcessMemory ;)☆16Jun 8, 2014Updated 11 years ago
- Tool to automatically make Cheat Engine attach to a process via the command line.☆29Jun 25, 2017Updated 8 years ago
- ☆10Nov 24, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆26Jan 1, 2017Updated 9 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆92Dec 6, 2018Updated 7 years ago
- An implementation of the Process Hollowing technique.☆16Dec 13, 2020Updated 5 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- Wechat PC Open More [PC 微信 多开 Demo]☆10Dec 20, 2018Updated 7 years ago
- Sends and injects pointer input between computers using the WinAPI☆33Feb 20, 2019Updated 7 years ago