Process Hacker 2 hiding from external applications
☆19Jun 2, 2015Updated 10 years ago
Alternatives and similar repositories for ph-malhide
Users that are interested in ph-malhide are comparing it to the libraries listed below
Sorting:
- ☆22May 25, 2017Updated 8 years ago
- analyze the content of the pe file on windows, and shell(pack) function for windows drivers.☆11Nov 9, 2018Updated 7 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- Wow64 syscall hook☆43May 28, 2017Updated 8 years ago
- easy detour-, vftable-, iat- and eathooking☆12Mar 30, 2016Updated 9 years ago
- An aggregate of tools used in the core of vmp_dbg plus other parsing utils to parse vmp bc.☆16Oct 18, 2016Updated 9 years ago
- library, which help to describe or load and execute PE files.☆13Jun 23, 2013Updated 12 years ago
- ☆17Oct 24, 2016Updated 9 years ago
- Hex Studio is a work in progress Hex viewer and editor.☆25Jun 7, 2017Updated 8 years ago
- Native Development Kit for Vista 64bit And Later, by me, Based on NDK Headers 1.0, by Alex Ionescu☆17Dec 6, 2015Updated 10 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Jun 18, 2018Updated 7 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Mar 31, 2014Updated 11 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- WPF helper library☆14Apr 6, 2019Updated 6 years ago
- Services and Drivers control application☆19Jul 24, 2017Updated 8 years ago
- Windows API hooking project to log all the windows / UIs with the exact timestamp when they are opened.☆15May 1, 2021Updated 4 years ago
- [2007] Windows tool, offers the ability to dynamically and transparently modify incoming and outgoing network traffic, as well as to redi…☆12Nov 27, 2017Updated 8 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 9 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆23May 31, 2017Updated 8 years ago
- ☆14May 9, 2017Updated 8 years ago
- C++ wrapper for the Windows structured storage implementation known as Compound Files☆20Aug 30, 2020Updated 5 years ago
- An analytical debugger programmed in C++, using Qt.☆22May 20, 2012Updated 13 years ago
- metasploit loader with antivirus bypass module☆18Jun 26, 2016Updated 9 years ago
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago
- ☆22Sep 15, 2022Updated 3 years ago
- WIP - Play with Intel VM Extensions☆23Jun 12, 2017Updated 8 years ago
- User-mode kernel callback framework☆10Nov 16, 2013Updated 12 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆28Apr 2, 2016Updated 9 years ago
- Ssdt Hook Detection tool☆13Nov 11, 2016Updated 9 years ago
- hypervisor in windows device driver by intel vt☆14Aug 25, 2018Updated 7 years ago
- An alternative tool to Sysinternals WinObj tool (nicer icons!)☆35Aug 31, 2018Updated 7 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆17Nov 4, 2012Updated 13 years ago
- Some of example code that I have collected while learning☆10Sep 25, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/guardlite☆11Jul 2, 2015Updated 10 years ago