Manual PE image mapper
☆66Aug 29, 2013Updated 12 years ago
Alternatives and similar repositories for DarkMMap
Users that are interested in DarkMMap are comparing it to the libraries listed below
Sorting:
- MouHidInputHook enables users to filter, modify, and inject mouse input data packets into the input data stream of HID USB mouse devices …☆11Jul 11, 2019Updated 6 years ago
- Lightweight WINAPI tracing with Pin☆27Aug 22, 2019Updated 6 years ago
- For Example. See Miro's Blog☆30Nov 26, 2022Updated 3 years ago
- ☆48Jun 19, 2017Updated 8 years ago
- BattlEye x64 usermode injector☆66Mar 20, 2019Updated 7 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆37Dec 10, 2018Updated 7 years ago
- ☆12Nov 6, 2017Updated 8 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- ☆44Oct 7, 2018Updated 7 years ago
- Intercepting DeviceControl via WPP☆138Nov 18, 2019Updated 6 years ago
- ☆125May 23, 2020Updated 5 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- enable libemu run pe file and add some good modify☆14Feb 4, 2019Updated 7 years ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 6 years ago
- ☆17Mar 3, 2016Updated 10 years ago
- hooking KiUserApcDispatcher☆27Apr 3, 2017Updated 8 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆59Sep 14, 2020Updated 5 years ago
- manually mapping the dll image into the process, dividing the image into parts of 0x1000 bytes and writing them in random order, which co…☆14Jan 10, 2023Updated 3 years ago
- ☆21Jul 18, 2017Updated 8 years ago
- This x64dbg plugin sets the page protection for memory mapped views in scenarios which cause NtProtectVirtualMemory to fail.☆123Mar 17, 2017Updated 9 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆14Mar 26, 2015Updated 10 years ago
- PE permutation library☆277Apr 8, 2023Updated 2 years ago
- Wow64 syscall hook☆43May 28, 2017Updated 8 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Aug 17, 2019Updated 6 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- Library for using direct system calls☆35Jan 30, 2025Updated last year
- A drop-in replacement for the C++ STL for kernel mode Windows drivers. The goal is to have implementations for things like the standard a…☆33Jul 12, 2016Updated 9 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- Basic utilities for executing, reading and writing 64-bit data in a 32-bit WoW64 process☆19Jul 8, 2022Updated 3 years ago
- x64 usermode rootkit☆212Apr 11, 2018Updated 7 years ago
- a Japanese food keeps you sane☆119Aug 22, 2015Updated 10 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆241Nov 6, 2019Updated 6 years ago
- 滥用cow机制进行全局注入☆99Jan 1, 2021Updated 5 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- ☆19Jun 20, 2019Updated 6 years ago
- C++ Exceptions in Windows Drivers☆222Dec 21, 2020Updated 5 years ago
- Obfuscates all RTTI (Run-time type information) inside a binary☆201Oct 17, 2017Updated 8 years ago