bartblaze / MessageBoxTests
MessageBox files (EXE, DLL) for testing purposes.
☆13Updated 6 years ago
Alternatives and similar repositories for MessageBoxTests:
Users that are interested in MessageBoxTests are comparing it to the libraries listed below
- x64dbg scripts for finding OEP of packers☆14Updated 6 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 5 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- AutoIt Analysis Library: Parser & Emulator For Malware Researchers☆20Updated 5 years ago
- ☆13Updated 10 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Updated 4 years ago
- ☆16Updated 2 years ago
- ☆18Updated 5 years ago
- the most basic DLL ever to pop a cmd.☆23Updated 4 years ago
- A simple and universal .NET proxy remover☆10Updated 4 years ago
- Collection of IDA helpers☆15Updated 2 years ago
- Source Code of MSIL Ransom☆13Updated 2 years ago
- Tool to extract contents from the memory of Windows systems.☆14Updated last year
- Help deobfuscate VBScript☆15Updated 2 years ago
- DLL and API hooking example to hide running in a Terminal Session☆18Updated 4 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆12Updated 3 years ago
- ☆7Updated 5 years ago
- Spoof parent process ID☆13Updated 6 years ago
- A simple PE loader.☆25Updated 2 years ago
- ☆10Updated 4 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 7 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- A template for projects using both libPeConv and MS Detours☆14Updated last year
- Sources Codes of many MSIL malwares☆23Updated 2 years ago
- This takes a full function .html report from Dll Export Viewer and converts it into #pragma statements used for dll hijacking proxy dlls.☆9Updated 6 years ago
- A small utility to run raw code chunks in the executable memory area.☆14Updated 10 years ago
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- Dump mapped PE files from memory to the disk☆19Updated 5 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 6 years ago