Xyl2k / DongleMeLinks
Feitian Rockey4ND dongle testing
☆34Updated 3 years ago
Alternatives and similar repositories for DongleMe
Users that are interested in DongleMe are comparing it to the libraries listed below
Sorting:
- ASProtect reverse engineering & analysis WinDbg extension☆23Updated 5 years ago
- ☆27Updated 10 years ago
- Zerokit shared code☆17Updated 6 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Updated 8 years ago
- Kernel (Ring0) - SSDT unhook driver☆15Updated 7 years ago
- Use WinDBG to trace the Windows API calls of any Portable Executable file☆32Updated 8 years ago
- A minimal tool to extract shellcode from 64-bit PE binaries.☆54Updated 4 years ago
- OllyCallTrace is a plugin for OllyDbg to trace the call chain of a thread.☆54Updated 14 years ago
- A wrapper for capstone for bearparser☆16Updated 4 months ago
- A session-0 capable dll injection utility☆76Updated 7 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- Miscellaneous old Exploit code and PoCs☆16Updated last year
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆65Updated 13 years ago
- Debugger checks in 3 ways☆19Updated 8 years ago
- Analysis and Modification Tool for Executables☆17Updated 6 years ago
- Code injection via delay load libraries☆36Updated 8 years ago
- Window Executable file Function tracer using Debugging API☆44Updated 6 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Updated 14 years ago
- penter hook example and driver time recorder☆31Updated 8 years ago
- ☆34Updated 8 years ago
- An API Monitor based on Instrumentation☆44Updated 8 years ago
- drvtriks kernel driver for Windows 7 SP1 and 8.1 x64, that tricks around in your system.☆34Updated 8 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Updated 11 years ago
- Simple PE packer with RtlCompressBuffer☆21Updated 10 years ago
- Kernel Shellcode to add all privileges in token☆15Updated 8 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Engine for communication with remote kernel debugger (KD, WinDbg) from drivers and applications☆37Updated 12 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Updated 7 years ago
- ☆29Updated 10 years ago