Squalr / Self-Modifying-CodeLinks
C++ Self Modifying Code (Self Assembing/Disassembling)
☆73Updated 5 years ago
Alternatives and similar repositories for Self-Modifying-Code
Users that are interested in Self-Modifying-Code are comparing it to the libraries listed below
Sorting:
- Smallest possible PE files. Artisanal, hand-crafted with love and care.☆38Updated 5 years ago
- Pointer Sequence Reverser - enable you to see how Windows C++ application is accessing a particular data member or object.☆74Updated 8 years ago
- API monitoring via return-hijacking thunks; works without information about target function prototypes.☆117Updated 5 years ago
- A local copy of Alex Ionescu's seemingly abandoned native-nt-toolkit project containing knowledge inherited from the ReactOS project.☆54Updated 6 years ago
- Experiments on C/C++ Exploits☆22Updated 5 years ago
- Intel pin tools☆22Updated 8 years ago
- Enumerate user mode shared memory mappings on Windows.☆126Updated 4 years ago
- PE file manipulation library.☆64Updated 5 years ago
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆17Updated 8 years ago
- executing JS from x86 code☆27Updated 6 years ago
- ☆72Updated 11 years ago
- Plugin of x64dbg to help you analyze object-oriented applications☆25Updated 5 years ago
- x86-64 virtual machine and disassembler☆146Updated 6 years ago
- Architectural privilege escalation on x86☆61Updated 7 years ago
- PICO processes toolbox, playground for PICO processes research☆73Updated 8 years ago
- reverse engineering extension plugin for windbg☆120Updated 6 years ago
- Lightweight x86-64 disassembling library☆44Updated 3 years ago
- This project aims to facilitate debugging a kernel driver in windows by adding support for a code change on the fly without reboot/unload…☆171Updated 2 years ago
- Writing WDF Drivers I: Core Concepts Lab Material☆53Updated 2 years ago
- Full DLL Hooking, phrack 65☆53Updated 2 years ago
- Inject code into a legitimate process☆146Updated 11 years ago
- Virtualization detection through speculative execution PoCs and papers☆69Updated 7 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆100Updated 4 years ago
- ReactOS x86-32 syscall fuzzer☆58Updated 5 months ago
- A simple password-based PE encryptor for Windows 32-bit executables.☆51Updated 11 months ago
- Custom LoadLibrary implementation☆60Updated 9 years ago
- Psychological warfare in reverse engineering☆198Updated 7 years ago
- A sample on how to inject a DLL from a kernel driver☆62Updated 9 years ago
- ☆35Updated 3 years ago
- x64dbg Dark Theme - Own use☆31Updated 6 years ago