SherifEldeeb / UniLogger
A "not-evil" keylogger with Unicode support
☆27Updated 12 years ago
Alternatives and similar repositories for UniLogger
Users that are interested in UniLogger are comparing it to the libraries listed below
Sorting:
- Gozi-MBR-rootkit Bootkit Modified☆68Updated 8 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Updated 9 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆38Updated 9 years ago
- ☆51Updated 8 years ago
- CAPE monitor DLLs☆41Updated 5 years ago
- ☆13Updated 8 years ago
- Various Crypter Project☆51Updated 11 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- Analyze and attack windows applications using dll hijacking vulnerabilities☆56Updated 5 years ago
- Alina POS Source Code + Rootkit☆23Updated 9 years ago
- a program to detect reflective dll injection on a live machine☆74Updated 9 years ago
- DLL Injection Library & Tools☆72Updated 8 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆58Updated 8 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆56Updated 6 years ago
- Simple PE packer with RtlCompressBuffer☆21Updated 9 years ago
- Simple proof of concept code for injecting libraries on 64bit processes from a 32bit process☆94Updated 6 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆43Updated 7 years ago
- KINS Banking Trojan☆61Updated 10 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆42Updated 8 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆26Updated 9 years ago
- Reflective DLL Injection style process infector☆20Updated 6 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆96Updated 3 years ago
- Blackhat 2012 Sample Codes☆93Updated 8 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 7 years ago
- Anti-AV compilation☆42Updated 11 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- PoC for detecting and dumping process hollowing code injection☆51Updated 6 years ago
- Passive UAC elevation using dll infection☆74Updated 10 years ago
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Updated 8 years ago