bxlcity / malware
☆35Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for malware
- ☆27Updated 7 years ago
- find and kill injectedThreads from memory☆10Updated 8 years ago
- A loadable dll that tracks memory changes, IAT hooks, and dynamically emplaced "JMP" in the host executable☆11Updated last year
- Kernel Shellcode to add all privileges in token☆13Updated 7 years ago
- Windows anti-rootkit library☆38Updated 9 years ago
- CVE-2014-0816☆24Updated 8 years ago
- Free_the_Debuggers☆19Updated 9 years ago
- User-mode part of Zerokit platform☆20Updated 5 years ago
- This tool will help to fix the Mach-O header of iOS kernel which dump from the memory. So that IDA or function symbol-related tools can l…☆22Updated 7 years ago
- runtime spy elf with android/linux and macho with macOS/IOS☆34Updated 7 years ago
- IDA plugin to Display Mach-O headers☆20Updated 13 years ago
- A C/C++ code obfuscator based on llvm/clang technology☆15Updated 10 years ago
- Convert machine code -> assembly code & assembly code -> machine code.☆19Updated 8 months ago
- ☆14Updated 6 years ago
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆12Updated 5 years ago
- IDA2PAT_Reloaded for windows and mac osx☆13Updated 7 years ago
- Malware monitor template based on MinHook☆16Updated 9 years ago
- Kernel-mode file scanner☆17Updated 6 years ago
- Updated version of ApiTracer Pin tool☆22Updated 6 years ago
- just an lite AntiRootkit for interesting☆23Updated 8 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 5 years ago
- ☆27Updated 9 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆21Updated 7 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆18Updated 8 years ago