SLAUC91 / SDS
Software Distribution Service
☆12Updated 9 years ago
Alternatives and similar repositories for SDS:
Users that are interested in SDS are comparing it to the libraries listed below
- Shareds for kernel developement☆28Updated 11 years ago
- ☆13Updated 6 years ago
- MIR-Engine☆24Updated 7 years ago
- ☆30Updated 6 years ago
- a method for undetectable breakpoints in 32-bit Windows programs☆13Updated 10 years ago
- Simple program for static hooking dynamic libraries in executable application☆22Updated 11 years ago
- New handle stealing technique for windows apps☆12Updated 7 years ago
- Contains various pintools to supplement the Intel DBI framework☆12Updated 9 years ago
- ☆10Updated 7 years ago
- Class implementation of PowerLoader injection technique☆29Updated 8 years ago
- win32/x64 obfuscate framework☆32Updated 6 years ago
- ☆14Updated 7 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆25Updated 10 years ago
- ☆17Updated 8 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago
- Figuring out the cause of a handle downgrade☆24Updated 2 years ago
- ☆19Updated 9 years ago
- Simple header only library to change return address on current stack frame.☆23Updated 8 years ago
- A driverless driver that is supposed to be manually mapped, usually by using TDL exploit. The driver shows how to read/write to any proce…☆21Updated 7 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 7 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago
- NT reversal☆25Updated 6 years ago
- ☆10Updated 7 years ago
- Reverse engineering AddVectoredExceptionHandler☆3Updated 2 years ago
- Legal access: The driver and console app to demonstrate the basic memory access in kernel mode☆9Updated 7 years ago
- Handy WMI query tool.☆12Updated 8 years ago
- windows kernel File redirection☆20Updated 10 years ago
- use crystalCPUID to identify vt-x & amd-v☆16Updated 10 years ago
- 🧶 The Win32 usermode threading library with UMS/fibers/threads support☆30Updated 5 years ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago