Slowerzs / CryptDecryptMemoryLinks
☆31Updated 8 months ago
Alternatives and similar repositories for CryptDecryptMemory
Users that are interested in CryptDecryptMemory are comparing it to the libraries listed below
Sorting:
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- ☆88Updated last year
- A more reliable way of resolving syscall numbers in Windows☆53Updated last year
- Demoting PPL anti-malware services to less than a guest user☆64Updated 6 months ago
- use python on windows with full submodule support without installation☆30Updated 7 months ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆85Updated last week
- shell code example☆62Updated 3 months ago
- Callstack spoofing using a VEH because VEH all the things.☆23Updated 5 months ago
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- Rust template/library for implementing your own COFF loader☆69Updated 6 months ago
- Exploiting the KsecDD Windows driver through Server Silos☆73Updated 9 months ago
- ☆35Updated 4 months ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- ☆100Updated last year
- List the ETW provider(s) in the registration table of a process.☆62Updated last year
- Reimplementation of the KExecDD DSE bypass technique.☆53Updated 11 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆63Updated last year
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆54Updated 7 months ago
- miscellaneous codes☆35Updated last year
- ☆61Updated last year
- A synergized Visual Studio and Rust development environment☆19Updated 7 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Updated 7 months ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆44Updated 7 months ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Updated 3 years ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆38Updated 5 months ago
- Mentally ill EtwTi parser☆65Updated last month
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆31Updated last year
- various methods of making API calls☆19Updated 6 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆60Updated last year
- Post-Ex BOF tooling for Hannibal☆24Updated 9 months ago