Squalr / Self-Modifying-CodeLinks
C++ Self Modifying Code (Self Assembing/Disassembling)
☆73Updated 5 years ago
Alternatives and similar repositories for Self-Modifying-Code
Users that are interested in Self-Modifying-Code are comparing it to the libraries listed below
Sorting:
- Pointer Sequence Reverser - enable you to see how Windows C++ application is accessing a particular data member or object.☆74Updated 7 years ago
- API monitoring via return-hijacking thunks; works without information about target function prototypes.☆118Updated 5 years ago
- executing JS from x86 code☆27Updated 6 years ago
- Enumerate user mode shared memory mappings on Windows.☆125Updated 4 years ago
- Architectural privilege escalation on x86☆59Updated 7 years ago
- Smallest possible PE files. Artisanal, hand-crafted with love and care.☆38Updated 5 years ago
- ☆108Updated 7 years ago
- Psychological warfare in reverse engineering☆194Updated 7 years ago
- A local copy of Alex Ionescu's seemingly abandoned native-nt-toolkit project containing knowledge inherited from the ReactOS project.☆54Updated 6 years ago
- ☆72Updated 11 years ago
- ReactOS x86-32 syscall fuzzer☆58Updated 4 months ago
- x86-64 virtual machine and disassembler☆151Updated 5 years ago
- A sample on how to inject a DLL from a kernel driver☆62Updated 9 years ago
- This project aims to facilitate debugging a kernel driver in windows by adding support for a code change on the fly without reboot/unload…☆171Updated 2 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆100Updated 4 years ago
- Full DLL Hooking, phrack 65☆53Updated 2 years ago
- A C polymorphic and metamorphic engine☆71Updated 6 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆29Updated 7 years ago
- Inject code into a legitimate process☆145Updated 10 years ago
- PICO processes toolbox, playground for PICO processes research☆74Updated 7 years ago
- PE file manipulation library.☆64Updated 5 years ago
- ViDi Visual Disassembler (experimental)☆79Updated last month
- Disassembler Library for x86 and x86-64☆14Updated 5 years ago
- reverse engineering extension plugin for windbg☆119Updated 6 years ago
- A novel technique to hide code from debuggers & disassemblers☆159Updated last year
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆17Updated 8 years ago
- Virtualization detection through speculative execution PoCs and papers☆68Updated 7 years ago
- Windows NT port of 'Main is usually a function. So then when is it not?'☆27Updated last year
- SentinelOne's KeRnel Exploits Advanced Mitigations☆54Updated 7 years ago
- PE Bliss - Cross-Platform Portable Executable C++ Library☆61Updated last year