YMahmoudnia / SB-LoaderLinks
SBLoader is a memory patcher to patch and execute the child process under the desired parent process.
☆14Updated 3 years ago
Alternatives and similar repositories for SB-Loader
Users that are interested in SB-Loader are comparing it to the libraries listed below
Sorting:
- A Practical example of ELAM (Early Launch Anti-Malware)☆35Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆28Updated 2 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 3 years ago
- ☆37Updated 7 months ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated 2 months ago
- ☆29Updated 2 years ago
- Overwrite MBR and add own custom message☆16Updated 5 years ago
- Read Memory without ReadProcessMemory for Current Process☆89Updated 3 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆27Updated 2 years ago
- Neutralize KEPServerEX anti-debugging techniques☆32Updated 2 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- Windows API Hashes used in the malwares☆42Updated 10 years ago
- NT AUTHORITY\SYSTEM☆40Updated 5 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆11Updated 2 years ago
- Simple API Hooks detector☆74Updated 3 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 3 years ago
- ☆114Updated 3 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆74Updated 4 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- A PoC of a privilege escalation vulnerability in the Realtek rtkio64 Windows driver.☆17Updated 5 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated 2 years ago
- Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.☆77Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Simple x86 Trampoline Hook☆42Updated 3 years ago
- ☆74Updated last year
- 2022 Updated Kernelmode-Code☆33Updated last year
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆23Updated 2 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 8 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆11Updated 4 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆57Updated 3 years ago