ctxis / capemon
CAPE monitor DLLs
☆38Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for capemon
- DLL Injection Library & Tools☆70Updated 8 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆37Updated 11 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆43Updated 7 years ago
- ☆21Updated 3 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 8 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆36Updated 7 years ago
- Analysis PE file or Shellcode☆48Updated 8 years ago
- The Minimalistic x86/x64 API Hooking Library for Windows☆32Updated 6 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 4 years ago
- Flare-On solutions☆36Updated 5 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆50Updated 6 years ago
- ☆41Updated 6 years ago
- ☆46Updated 7 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago
- ☆33Updated 7 years ago
- ransomware_begone☆42Updated 8 years ago
- ☆51Updated 7 years ago
- Telsy CTI Research Team☆57Updated 3 years ago
- A simple API monitor for Windbg☆62Updated 7 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆117Updated 4 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 7 years ago
- Blog posts☆30Updated 4 years ago
- ☆22Updated 7 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- Enumerate Windows Defender threat families and dump their names according category☆86Updated 5 years ago
- ☆45Updated 6 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 7 years ago