PELock / starter
A small utility to run raw code chunks in the executable memory area.
☆14Updated 10 years ago
Alternatives and similar repositories for starter:
Users that are interested in starter are comparing it to the libraries listed below
- ☆20Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Debugger checks in 3 ways☆19Updated 7 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Updated 4 years ago
- ☆7Updated last month
- Static library and headers for linking your software with ntdll.dll☆32Updated 5 years ago
- Headers for linking your software with ntdll.dll☆15Updated 4 years ago
- Infects PE files with a shellcode☆18Updated 6 years ago
- Decrypt Wireless Passwords On Windows☆14Updated 4 years ago
- An example of PE hollowing injection technique☆23Updated 5 years ago
- Analysis and Modification Tool for Executables☆16Updated 6 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Dump mapped PE files from memory to the disk☆20Updated 5 years ago
- Proof of concept headless GUI DLL☆12Updated 3 years ago
- Remote PE reflective injection with a simple reflective loader☆31Updated 5 years ago
- Subtract one PE file from another!☆22Updated 3 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Updated 3 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Updated last year
- Detour hooking IRQ1 ISR through IDT (Interrupt Descriptor Table)☆19Updated 2 years ago
- Another Portable Executable files analysing stuff☆21Updated 13 years ago
- Code injection via ZwCreateSection, ZwUnmapViewOfSection. C++ example☆17Updated 3 years ago
- hooking KiUserApcDispatcher☆24Updated 8 years ago
- Zerokit shared code☆16Updated 6 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 6 years ago
- Code Integrity Violation Spotter☆16Updated 10 months ago
- D00☆6Updated 3 years ago
- Execute an arbitrary command within the context of another process☆20Updated 5 years ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16Updated 2 years ago
- ☆10Updated 4 years ago