YoavLevi / IAT-TracerView external linksLinks
An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (.tag) files.
☆125Jul 12, 2024Updated last year
Alternatives and similar repositories for IAT-Tracer
Users that are interested in IAT-Tracer are comparing it to the libraries listed below
Sorting:
- ☆180Apr 24, 2025Updated 9 months ago
- ☆100Oct 7, 2023Updated 2 years ago
- TypeLib persistence technique☆139Oct 22, 2024Updated last year
- A command line Windows API tracing tool for Golang binaries.☆159Dec 4, 2023Updated 2 years ago
- ☆83Nov 1, 2023Updated 2 years ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆280Sep 18, 2024Updated last year
- ☆290Jul 20, 2023Updated 2 years ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆321Jan 17, 2024Updated 2 years ago
- A Pin Tool for tracing API calls etc☆1,616Feb 8, 2026Updated last week
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆140Sep 14, 2024Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.☆89Nov 9, 2023Updated 2 years ago
- a tool used to analyze and monitor in named pipes☆193Oct 27, 2024Updated last year
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆130May 17, 2023Updated 2 years ago
- Windows x64 kernel mode rootkit process hollowing POC.☆189Jun 30, 2023Updated 2 years ago
- Aims to identify sleeping beacons☆659Jan 25, 2026Updated 3 weeks ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆478Jun 25, 2025Updated 7 months ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆116Jul 17, 2024Updated last year
- Process Injection using Thread Name☆297Apr 18, 2025Updated 9 months ago
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆358Aug 11, 2024Updated last year
- ☆46Jun 21, 2023Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆171May 13, 2024Updated last year
- Info on how to use Kerberos KDC on a non-domain joined host☆53Jul 31, 2024Updated last year
- Yet another LLVM-based obfuscator☆124Sep 3, 2024Updated last year
- Splitting and executing shellcode across multiple pages☆103Jun 8, 2023Updated 2 years ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆225Jul 25, 2023Updated 2 years ago
- Local & remote Windows DLL Proxying☆170Jun 17, 2024Updated last year
- ☆778Oct 17, 2023Updated 2 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆259Jun 29, 2024Updated last year
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆138Sep 12, 2022Updated 3 years ago
- Hardcore Debugging☆929Jan 6, 2026Updated last month
- Ida Pro plugin to aid in reverse engineering Rust binaries.☆19Dec 9, 2024Updated last year
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆75Mar 14, 2025Updated 11 months ago
- ☆149Jan 25, 2024Updated 2 years ago
- A shellcode function to encrypt a running process image when sleeping.☆340Sep 11, 2021Updated 4 years ago