ctxis / capemonLinks
CAPE monitor DLLs
☆41Updated 5 years ago
Alternatives and similar repositories for capemon
Users that are interested in capemon are comparing it to the libraries listed below
Sorting:
- ☆22Updated 4 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago
- Modified edition of cuckoomon☆49Updated 7 years ago
- Analysis PE file or Shellcode☆49Updated 8 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆38Updated 9 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 7 years ago
- ☆43Updated 6 years ago
- ☆45Updated 7 years ago
- The Minimalistic x86/x64 API Hooking Library for Windows☆32Updated 7 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆56Updated 6 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆50Updated 7 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 5 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Updated 9 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- DLL Injection Library & Tools☆72Updated 8 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- ransomware_begone☆42Updated 9 years ago
- PoC for detecting and dumping process hollowing code injection☆51Updated 6 years ago
- Blog posts☆30Updated 4 years ago
- C++ wrapper for YARA.☆45Updated 5 years ago
- Use WinDBG to trace the Windows API calls of any Portable Executable file☆31Updated 8 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 12 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆41Updated 5 years ago
- ☆33Updated 6 years ago
- Sample libraries to be used with IAT Patcher☆34Updated 2 years ago
- Load a Windows Kernel Driver☆92Updated 8 years ago
- Plugin for x64dbg to generate Yara rules from function basic blocks.☆36Updated 7 years ago
- zer0m0n driver for cuckoo sandbox☆87Updated 8 years ago