SpookySec / GHRLLinks
Game Hacking Ruby Lib
☆24Updated 4 years ago
Alternatives and similar repositories for GHRL
Users that are interested in GHRL are comparing it to the libraries listed below
Sorting:
- A journal for $6,000 Riot Vanguard bounty.☆67Updated 2 years ago
- Scan for potentially vulnerable drivers☆94Updated 3 years ago
- simple user-mode Rootkit☆108Updated 3 years ago
- Easy XOR string encryption for NET based binaries☆140Updated 2 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆111Updated 3 years ago
- stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage…☆26Updated 10 months ago
- Exploitable drivers, you know what I mean☆153Updated 2 months ago
- Simple x86 Trampoline Hook☆44Updated 3 years ago
- PoC for popping a system shell against the LnvMSRIO.sys driver☆117Updated 3 months ago
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆43Updated last year
- ☆72Updated 2 years ago
- ANY.RUN sandbox detection collection☆22Updated last year
- POC of a better implementation of GetProcAddress for ntdll using binary search☆111Updated last year
- using the gpu to hide your payload☆63Updated 3 years ago
- A small tool I made to dump the export table of PE files. The primary use case was intended for use within DLL proxying.☆71Updated 3 years ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆18Updated 2 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆112Updated 2 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆128Updated 11 months ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆88Updated 4 years ago
- Detours implementation (x64/x86) which used only ntdll import☆90Updated 3 months ago
- A Bumblebee-inspired Crypter☆79Updated 3 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Updated 3 years ago
- Simple website to automatically generate string encryption/decryption routines for C#☆10Updated 3 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆17Updated last year
- uefi diskless persistence technique + OVMF secureboot bypass☆95Updated last year
- Abusing exceptions for code execution.☆113Updated 3 years ago
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆166Updated 2 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated 2 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆66Updated 2 years ago