ajkhoury / Dude-LoaderLinks
Class implementation of PowerLoader injection technique
☆31Updated 8 years ago
Alternatives and similar repositories for Dude-Loader
Users that are interested in Dude-Loader are comparing it to the libraries listed below
Sorting:
- Reflective DLL Injection style process infector☆20Updated 6 years ago
- User-mode hook bypassing method☆33Updated 8 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago
- drvtriks kernel driver for Windows 7 SP1 and 8.1 x64, that tricks around in your system.☆32Updated 7 years ago
- Simple PE packer with RtlCompressBuffer☆21Updated 9 years ago
- Polymorphic Stub Creator☆34Updated 8 years ago
- Contains various pintools to supplement the Intel DBI framework☆12Updated 10 years ago
- Shareds for kernel developement☆28Updated 11 years ago
- MIR-Engine☆24Updated 8 years ago
- win32/x64 obfuscate framework☆32Updated 6 years ago
- Simple header only library to change return address on current stack frame.☆24Updated 8 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 8 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- just an lite AntiRootkit for interesting☆23Updated 9 years ago
- Kernel mode windows NT API logger☆22Updated 5 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆25Updated 11 years ago
- Enumerate process modules manually☆9Updated 2 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Updated 11 years ago
- ☆16Updated 5 years ago
- Code Injection technique written in cpp language☆32Updated 7 years ago
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Updated 10 years ago
- A driverless driver that is supposed to be manually mapped, usually by using TDL exploit. The driver shows how to read/write to any proce…☆21Updated 7 years ago
- MazzCrypt - You won't ever get caught. A [was-private] polymorphic source code parser to randomize executables. Inspired by PolyLoader by…☆12Updated 8 years ago
- Software Distribution Service☆12Updated 10 years ago
- ☆19Updated 9 years ago
- hooking KiUserApcDispatcher☆24Updated 8 years ago
- A POC for Windows Extension Host hooking☆22Updated 5 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Updated 5 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Updated 9 years ago