SpookySec / GHRLLinks
Game Hacking Ruby Lib
☆24Updated 3 years ago
Alternatives and similar repositories for GHRL
Users that are interested in GHRL are comparing it to the libraries listed below
Sorting:
- simple user-mode Rootkit☆105Updated 2 years ago
- A journal for $6,000 Riot Vanguard bounty.☆63Updated last year
- Scan for potentially vulnerable drivers☆87Updated 3 years ago
- A very weird RAT☆19Updated 2 years ago
- 💻 Windows 10 Kernel-mode rootkit☆31Updated 2 years ago
- ☆45Updated 4 months ago
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆42Updated 8 months ago
- codecave hook reverse engineering toolkit.☆36Updated last year
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆25Updated last year
- Native Shellcode Injector Via Handle Hijacking & Pool Party.☆12Updated last year
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆87Updated 4 years ago
- ☆25Updated 7 months ago
- A tool implementing process hollowing making your PE polymorphic☆15Updated 4 years ago
- Easy XOR string encryption for NET based binaries☆138Updated last year
- Simple API Hooks detector☆73Updated 2 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated last year
- Polymorphic ELF Runtime Crypter written in rust.☆21Updated 4 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆110Updated last year
- using the gpu to hide your payload☆58Updated 2 years ago
- A simple Windows kernel rootkit.☆92Updated 3 weeks ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆26Updated 5 years ago
- Simple x86 Trampoline Hook☆40Updated 2 years ago
- Undetected DLL Injection Method☆36Updated 2 years ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆137Updated 2 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆104Updated 2 years ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- A small tool I made to dump the export table of PE files. The primary use case was intended for use within DLL proxying.☆70Updated 2 years ago
- A manual PE mapping implementation, aka reflective loader☆19Updated 2 years ago
- Read Memory without ReadProcessMemory for Current Process☆76Updated 3 years ago
- ANY.RUN sandbox detection collection☆19Updated 9 months ago