am0nsec / masm64
Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.
☆15Updated 4 years ago
Related projects: ⓘ
- A Practical example of ELAM (Early Launch Anti-Malware)☆27Updated 2 years ago
- ☆19Updated this week
- ☆14Updated last year
- ☆11Updated this week
- really ?☆12Updated 6 months ago
- C code to enable ETW tracing for Dotnet Assemblies☆28Updated 2 years ago
- ☆31Updated this week
- ☆21Updated this week
- A collection of tools for debugging Windows application crashes.☆12Updated last year
- ☆40Updated this week
- ☆10Updated 4 years ago
- Subtract one PE file from another!☆19Updated 2 years ago
- A simple PE loader.☆25Updated last year
- Remote PE reflective injection with a simple reflective loader☆28Updated 5 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- Dangling COM Keys Finder☆14Updated 2 years ago
- ☆27Updated last year
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 5 years ago
- ☆16Updated 5 years ago
- ☆25Updated 9 months ago
- ☆22Updated last year
- A DLL that serves OutputDebugString content over a TCP connection☆33Updated 2 years ago
- C Header Only Library for Virii☆9Updated 3 years ago
- ☆20Updated 3 years ago
- Here are some of my malware reversing papers that I will be publishing☆30Updated 2 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 2 years ago
- An example of COM hijacking using a proxy DLL.☆20Updated 3 years ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆32Updated 3 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆38Updated 3 years ago