buzzer-re / ShinigamiLinks
A dynamic unpacking tool
☆145Updated 2 years ago
Alternatives and similar repositories for Shinigami
Users that are interested in Shinigami are comparing it to the libraries listed below
Sorting:
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆124Updated last year
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆127Updated 2 years ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆148Updated last year
- x86/x64 Ring 0/-2 System Freezer/Debugger☆119Updated 7 months ago
- Windows x64 kernel mode rootkit process hollowing POC.☆189Updated 2 years ago
- Exploitable drivers, you know what I mean☆154Updated last month
- Recon 2023 slides and code☆80Updated 2 years ago
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆47Updated last year
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆223Updated 2 years ago
- Code samples that serve as references for Windows API functions☆77Updated last year
- ☆121Updated this week
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆64Updated last year
- MalUnpack companion driver☆99Updated last year
- An x64dbg plugin which helps make sense of long C++ symbols☆57Updated 2 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆36Updated 2 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆118Updated 2 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115Updated 2 years ago
- Generate a proxy dll for arbitrary dll☆217Updated last year
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆110Updated 10 months ago
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆242Updated 2 years ago
- Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls☆207Updated 4 months ago
- Admin to Kernel code execution using the KSecDD driver☆259Updated last year
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆78Updated 6 months ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆106Updated 3 years ago
- Report and exploit of CVE-2023-36427☆88Updated 2 years ago
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆128Updated 2 years ago
- ☆112Updated 2 weeks ago
- uefi diskless persistence technique + OVMF secureboot bypass☆95Updated last year
- A journal for $6,000 Riot Vanguard bounty.☆67Updated 2 years ago
- ☆72Updated 2 years ago