codereversing / runfromregLinks
Run executables from the Windows registry
☆16Updated 2 years ago
Alternatives and similar repositories for runfromreg
Users that are interested in runfromreg are comparing it to the libraries listed below
Sorting:
- PE Infector/Cryptor source code☆20Updated 2 years ago
- Winsock inspection/filtering/modifying☆19Updated 2 years ago
- Run one process as another under Windows☆11Updated 2 years ago
- Diffing process heaps☆15Updated 2 years ago
- Enumerate process modules manually☆9Updated 2 years ago
- ☆51Updated 8 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- An implementation of a generic unpacker based on Intel PIN☆28Updated 8 years ago
- kernel exploitation helper class☆77Updated 8 years ago
- Some source code snippets In my development.☆27Updated 3 years ago
- Hooking vtables☆10Updated 2 years ago
- Anti-AV compilation☆43Updated 11 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆42Updated 8 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36Updated 9 years ago
- Simple standalone bundle of NT core APIs☆26Updated 9 years ago
- windows create process with a dll load first time via LdrHook☆30Updated 8 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 12 years ago
- Ring3 Rootkit Backdoor.☆41Updated 9 years ago
- ☆80Updated 7 years ago
- Malpimp is an advanced API tracing tool and designed to automate the reverse engineering process. In the backend it uses pydbg to hook t…☆8Updated 8 years ago
- Sample libraries to be used with IAT Patcher☆34Updated 2 years ago
- Windows kernel vulnerability in win32k.sys Driver☆35Updated 9 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 9 years ago
- Runtime DirectX9 Hooking☆17Updated 2 years ago
- Simple proof of concept code for injecting libraries on 64bit processes from a 32bit process☆96Updated 6 years ago
- Exploiting MS15-061 local Privilege escalation☆49Updated 9 years ago
- A windbg extension, extracting token related contents☆41Updated 4 years ago
- Internet Explorer MemoryProtection Mitigation☆32Updated 10 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago