adamhlt / ASLR-Disabler
ASLR Disabler (x86 / x64) - Little utility for disabling the ASLR on PE files
☆14Updated last year
Alternatives and similar repositories for ASLR-Disabler
Users that are interested in ASLR-Disabler are comparing it to the libraries listed below
Sorting:
- Small class to help perform syscalls.☆21Updated this week
- A class to gather information about a process, its threads and modules.☆24Updated 5 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆44Updated 2 years ago
- Single header library to simplify the usage of direct syscalls. x64/x86☆11Updated 2 years ago
- Bypassing kernel patch protection runtime☆20Updated 2 years ago
- Signature scanner and API hooks to detect malicious process injection☆27Updated 2 years ago
- x64 Windows privilege elevation using anycall☆21Updated 3 years ago
- Fake Timestamps of Driver Certificates while keeping validity.☆17Updated 3 years ago
- Process Creation, Image Load and Thread Creation Notification☆12Updated last year
- Black Signature Driver☆23Updated last year
- ☆27Updated last year
- Debug Print viewer (user and kernel)☆66Updated last year
- Windows driver template, using C++20 & cmake & GithubActions☆22Updated 9 months ago
- ☆27Updated 2 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆54Updated 2 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆10Updated 2 years ago
- AMx64 is a simulated 64-bit environment that can interpret nasm-like asm code. It allows a usage of different 64-bit registers and 64-bit…☆23Updated last year
- An example code of CiGetCertPublisherName☆15Updated 3 years ago
- Proof-of-concept post-build obfuscator for Unity IL2CPP projects☆17Updated 4 months ago
- neat way to detect memory read using nt layer function.☆14Updated last year
- Ready-to-use headers for Windows Kernel SSDT indices☆11Updated 5 years ago
- ☆27Updated 2 years ago
- Simple tool to dump/hide services in services.exe process.☆14Updated 3 years ago
- EDR PoC WIP LLC☆11Updated last year
- Illustrates the concept of return address spoofing, and how it is used.☆13Updated 5 years ago
- ☆36Updated 2 years ago
- direct systemcalls with a modern c++20 interface.☆42Updated 2 years ago
- ☆12Updated 2 years ago
- simple shared memory kernel-driver (its ass)☆11Updated last year