An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (.tag) files.
☆125Jul 12, 2024Updated last year
Alternatives and similar repositories for IAT-Tracer
Users that are interested in IAT-Tracer are comparing it to the libraries listed below
Sorting:
- ☆181Apr 24, 2025Updated 10 months ago
- ☆101Oct 7, 2023Updated 2 years ago
- TypeLib persistence technique☆140Oct 22, 2024Updated last year
- A command line Windows API tracing tool for Golang binaries.☆159Dec 4, 2023Updated 2 years ago
- ☆83Nov 1, 2023Updated 2 years ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- ☆291Jul 20, 2023Updated 2 years ago
- A Pin Tool for tracing API calls etc☆1,625Feb 8, 2026Updated last month
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆324Jan 17, 2024Updated 2 years ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆140Sep 14, 2024Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.☆89Nov 9, 2023Updated 2 years ago
- a tool used to analyze and monitor in named pipes☆194Oct 27, 2024Updated last year
- Windows x64 kernel mode rootkit process hollowing POC.☆189Jun 30, 2023Updated 2 years ago
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆133May 17, 2023Updated 2 years ago
- Aims to identify sleeping beacons☆661Jan 25, 2026Updated last month
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆479Jun 25, 2025Updated 8 months ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆117Jul 17, 2024Updated last year
- Process Injection using Thread Name☆306Apr 18, 2025Updated 10 months ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆112Dec 28, 2022Updated 3 years ago
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆360Aug 11, 2024Updated last year
- ☆46Jun 21, 2023Updated 2 years ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- Info on how to use Kerberos KDC on a non-domain joined host☆53Jul 31, 2024Updated last year
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆174May 13, 2024Updated last year
- Splitting and executing shellcode across multiple pages☆103Jun 8, 2023Updated 2 years ago
- Yet another LLVM-based obfuscator☆125Sep 3, 2024Updated last year
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆225Jul 25, 2023Updated 2 years ago
- Local & remote Windows DLL Proxying☆169Jun 17, 2024Updated last year
- ☆777Oct 17, 2023Updated 2 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆262Jun 29, 2024Updated last year
- Hardcore Debugging☆934Jan 6, 2026Updated 2 months ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆140Sep 12, 2022Updated 3 years ago
- Ida Pro plugin to aid in reverse engineering Rust binaries.☆19Dec 9, 2024Updated last year
- ☆149Jan 25, 2024Updated 2 years ago
- A shellcode function to encrypt a running process image when sleeping.☆339Sep 11, 2021Updated 4 years ago