SamLarenN / MIR-EngineLinks
MIR-Engine
☆24Updated 8 years ago
Alternatives and similar repositories for MIR-Engine
Users that are interested in MIR-Engine are comparing it to the libraries listed below
Sorting:
- Software Distribution Service☆12Updated 10 years ago
- Shareds for kernel developement☆28Updated 11 years ago
- Spoof Windows Test Signing Mode☆29Updated 6 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆25Updated 11 years ago
- just an lite AntiRootkit for interesting☆23Updated 9 years ago
- New handle stealing technique for windows apps☆13Updated 7 years ago
- ice9 - is anticheat based on usermode tricks and undocumented methods , builded as dll for loading trought the shibari framework☆22Updated 6 months ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- A driverless driver that is supposed to be manually mapped, usually by using TDL exploit. The driver shows how to read/write to any proce…☆21Updated 7 years ago
- My take on the capcom driver vulnerability☆28Updated 8 years ago
- Class implementation of PowerLoader injection technique☆32Updated 8 years ago
- TLB Splitting with intel vt-d and KVM☆21Updated 7 years ago
- Reverse engineering AddVectoredExceptionHandler☆3Updated 3 years ago
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Updated 10 years ago
- Simple program for static hooking dynamic libraries in executable application☆23Updated 11 years ago
- ☆14Updated 8 years ago
- A Windows driver used to facilitate DLL injection☆26Updated 7 years ago
- Makes drivers less sucky to manage from usermode.☆11Updated 9 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 6 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago
- Allows you to hook D3D dynamically - without having to research addresses or hook public API. Just grab the device!☆33Updated 10 years ago
- Wow64 syscall hook☆41Updated 8 years ago
- ☆24Updated 7 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago
- Hidden module/dll detector for windows apps☆15Updated 8 years ago
- ☆11Updated 10 years ago
- Polymorphic Stub Creator☆34Updated 8 years ago
- Handy WMI query tool.☆12Updated 9 years ago
- Analyze PatchGuard☆59Updated 6 years ago