XaFF-XaFF / WinREPL
WinREPL is a "read-eval-print loop" shell on Windows that is useful for testing/learning x86 and x64 assembly.
☆13Updated 2 years ago
Alternatives and similar repositories for WinREPL:
Users that are interested in WinREPL are comparing it to the libraries listed below
- Using Thread Description To Hide Shellcodes☆14Updated 2 years ago
- Subtract one PE file from another!☆20Updated 3 years ago
- Implementation of ITaskHandler in C++☆13Updated 2 years ago
- A tiny Windows hook library for x86/x64☆14Updated last year
- Yet another Windows DLL injector.☆38Updated 3 years ago
- An attempt at reversing WindowsDefender☆20Updated 4 months ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆17Updated last year
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆9Updated 2 years ago
- ☆12Updated last year
- ☆50Updated 2 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆38Updated 4 years ago
- Code Integrity Violation Spotter☆16Updated 8 months ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆18Updated 2 years ago
- Example of building an application verifer DLL☆44Updated 8 months ago
- doesnt work and wont work on it anymore☆10Updated 7 months ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆37Updated 2 years ago
- Released presentations of my talks + code that used during these talks☆13Updated 5 months ago
- using the kct to run your shellcode the apt style☆13Updated 2 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Updated last year
- really ?☆12Updated 11 months ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Updated 4 years ago
- ☆20Updated last month
- NT AUTHORITY\SYSTEM☆37Updated 4 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- Tools for analyzing Windows containers and break container's isolation☆29Updated 2 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16Updated 2 years ago
- Hooking Heavens Gate in a weekend☆13Updated 3 years ago
- Windows PDB Parser using Imagehlp library.☆16Updated 2 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- ☆21Updated 9 months ago