SanseoLab / simpleAVdriverLinks
Simple AntiVirus Driver example
☆38Updated 7 years ago
Alternatives and similar repositories for simpleAVdriver
Users that are interested in simpleAVdriver are comparing it to the libraries listed below
Sorting:
- A command line tool to load and unload a device driver.☆47Updated 7 years ago
- Windows Simple Process Logger implemented as driver☆18Updated 7 years ago
- Open Source Libraries Collection☆24Updated 9 years ago
- a network filter using NDIS hook technique☆19Updated 12 years ago
- ☆31Updated 4 years ago
- A simple rootkit to hide a process☆46Updated 11 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆56Updated 6 years ago
- Windows Console Monitor☆34Updated 5 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆60Updated 4 years ago
- Load and unload a DLL into an remote process without using WriteProcessMemory ;)☆16Updated 10 years ago
- ☆33Updated 4 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆34Updated 5 years ago
- Analyze and attack windows applications using dll hijacking vulnerabilities☆56Updated 5 years ago
- A DLL that performs IAT hooking☆27Updated 6 years ago
- ☆40Updated 5 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆51Updated 4 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Updated 9 years ago
- A-Protect Anti Rootkit Tool☆53Updated 11 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- Windows anti-rootkit library☆39Updated 10 years ago
- HTTP/HTTPS/DNS inspector (windows driver)☆26Updated 6 years ago
- x86/x64 dll injector☆30Updated 3 years ago
- exploit termdd.sys(support kb4499175)☆59Updated 5 years ago
- ☆10Updated 9 years ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago
- Wow64 syscall hook☆40Updated 8 years ago
- Anti-Anti-VM solution via Windows Driver☆58Updated 7 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 3 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago
- win32/x64 obfuscate framework☆32Updated 6 years ago