cappsule / cappsule-userlandLinks
☆9Updated 8 years ago
Alternatives and similar repositories for cappsule-userland
Users that are interested in cappsule-userland are comparing it to the libraries listed below
Sorting:
- Bootkits Revisited☆40Updated 11 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Updated 9 years ago
- Open Source Rootkit☆22Updated 8 years ago
- reverse engineering, visual binary analysis☆24Updated 8 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆40Updated 11 years ago
- ☆86Updated 8 years ago
- ☆31Updated 9 years ago
- Anti-AV compilation☆44Updated 11 years ago
- Code Injector Using Code Caves☆15Updated 10 years ago
- windows create process with a dll load first time via LdrHook☆30Updated 8 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- ☆34Updated 7 years ago
- Sample libraries to be used with IAT Patcher☆34Updated 2 years ago
- Samples about Microsoft RPC and native API calls in Windows C☆62Updated 9 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- Engine for communication with remote kernel debugger (KD, WinDbg) from drivers and applications☆37Updated 12 years ago
- Windows KExec☆25Updated 15 years ago
- Identifying and Disrupting Crypto-Ransomware (and Destructive Malware) using handle heurustics☆55Updated 10 years ago
- Simple proof of concept code for injecting libraries on 64bit processes from a 32bit process☆96Updated 6 years ago
- ☆16Updated 7 years ago
- User-mode hook bypassing method☆33Updated 8 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Updated 8 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 9 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- Application for random attack on Green Petya's key☆24Updated 8 years ago
- Malware analyses and helpful scripts☆29Updated 3 years ago
- ☆18Updated 8 years ago
- Class implementation of PowerLoader injection technique☆32Updated 8 years ago
- A Python parser for Rich Headers☆15Updated 10 years ago