SpookySec / GHRL
Game Hacking Ruby Lib
☆24Updated 3 years ago
Alternatives and similar repositories for GHRL:
Users that are interested in GHRL are comparing it to the libraries listed below
- Simple x86 Trampoline Hook☆40Updated 2 years ago
- A journal for $6,000 Riot Vanguard bounty.☆63Updated last year
- A very weird RAT☆19Updated 2 years ago
- 💻 Windows 10 Kernel-mode rootkit☆31Updated 2 years ago
- Scan for potentially vulnerable drivers☆86Updated 3 years ago
- ☆24Updated 6 months ago
- I/O Cache-As-Ram + AMD x86_64 cache line locking | Mirror of https://codeberg.org/3itch/icekit☆14Updated last month
- using the gpu to hide your payload☆57Updated 2 years ago
- simple user-mode Rootkit☆103Updated 2 years ago
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆39Updated 6 months ago
- Bypass Malware Time Delays☆101Updated 2 years ago
- Polymorphic ELF Runtime Crypter written in rust.☆21Updated 4 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆14Updated 8 months ago
- Native Shellcode Injector Via Handle Hijacking & Pool Party.☆12Updated last year
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆25Updated this week
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆87Updated 3 years ago
- A small tool I made to dump the export table of PE files. The primary use case was intended for use within DLL proxying.☆69Updated 2 years ago
- 「🧊」Ring 3 Rootkit for Windows 10☆57Updated 4 months ago
- ☆44Updated 2 months ago
- Standalone Metasploit-like XOR encoder for shellcode☆48Updated 11 months ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆29Updated 2 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆12Updated 3 months ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated last year
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆26Updated 5 years ago
- uefi diskless persistence technique + OVMF secureboot bypass☆61Updated 11 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆38Updated 7 months ago
- reverse engineering random malwares☆21Updated 2 months ago
- This is a simple process injection made in C for Linux systems☆26Updated last year
- POC of a better implementation of GetProcAddress for ntdll using binary search☆108Updated last year
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆27Updated 8 months ago