SpookySec / GHRL
Game Hacking Ruby Lib
☆24Updated 3 years ago
Alternatives and similar repositories for GHRL:
Users that are interested in GHRL are comparing it to the libraries listed below
- A journal for $6,000 Riot Vanguard bounty.☆59Updated last year
- user-mode Rootkit☆102Updated 2 years ago
- ☆40Updated 7 months ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆9Updated last year
- Scan for potentially vulnerable drivers☆84Updated 2 years ago
- ☆27Updated 10 months ago
- uefi diskless persistence technique + OVMF secureboot bypass☆53Updated 9 months ago
- 💻 Windows 10 Kernel-mode rootkit☆31Updated 2 years ago
- x86 Trampoline Hook☆40Updated 2 years ago
- A small tool I made to dump the export table of PE files. The primary use case was intended for use within DLL proxying.☆69Updated 2 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Updated 5 months ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆33Updated last year
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆86Updated 3 years ago
- using the gpu to hide your payload☆53Updated 2 years ago
- Bypass Malware Time Delays☆100Updated 2 years ago
- This repo for Windows x32-x64 Kernel/Driver/User Mode Exploitation writeups and exploits☆23Updated 8 months ago
- ☆18Updated last month
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆41Updated 4 months ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated last year
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆16Updated last year
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆27Updated 2 years ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆40Updated last year
- Extracts the files embedded inside of a .NET AppHost.☆18Updated 5 months ago
- Fully working kernel-mode VAC bypass☆49Updated 3 months ago
- A manual PE mapping implementation, aka reflective loader☆18Updated 2 years ago
- Simple website to automatically generate string encryption/decryption routines for C#☆9Updated 2 years ago
- A VMWare logger using built-in backdoor.☆27Updated 3 months ago
- PoC of a UEFI Petya ransomware☆40Updated 2 years ago