SamLarenN / PSC-Engine
Polymorphic Stub Creator
☆32Updated 7 years ago
Alternatives and similar repositories for PSC-Engine:
Users that are interested in PSC-Engine are comparing it to the libraries listed below
- ☆16Updated 5 years ago
- Скрытие строки от отладчиков и декомпиляторов☆50Updated 5 years ago
- win32/x64 obfuscate framework☆32Updated 5 years ago
- drvtriks kernel driver for Windows 7 SP1 and 8.1 x64, that tricks around in your system.☆31Updated 7 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆53Updated 5 years ago
- Takes a Windbg dumped structure (using the 'dt' command) and formats it into a C structure☆35Updated 8 months ago
- Shareds for kernel developement☆28Updated 11 years ago
- ☆26Updated 7 years ago
- map driver to memory☆25Updated 6 years ago
- Simple header only library to change return address on current stack frame.☆23Updated 8 years ago
- just an lite AntiRootkit for interesting☆23Updated 9 years ago
- using gpuz to load driver☆33Updated 6 years ago
- Protected Process Light Library☆18Updated 4 years ago
- (DEPRECATED) A simple anti-anti debug library for Windows☆29Updated 4 years ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago
- Another method to anti ThreadHideFromDebugger☆35Updated 6 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆25Updated 10 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Updated 7 years ago
- ☆24Updated 6 years ago
- For Example. See Miro's Blog☆30Updated 2 years ago
- fork HoShiMin Avanguard☆19Updated 6 years ago
- Kernel-Mode rootkit that connects to a remote server to send & recv commands☆31Updated 6 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆75Updated 3 years ago
- ☆14Updated 7 years ago
- ☆27Updated 5 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- My take on the capcom driver vulnerability☆27Updated 7 years ago
- NT reversal☆25Updated 6 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆24Updated 3 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆55Updated 6 years ago