dennisbabkin / SigRemoverLinks
Utility to remove digital code signature from binary PE files in Windows.
☆17Updated 4 years ago
Alternatives and similar repositories for SigRemover
Users that are interested in SigRemover are comparing it to the libraries listed below
Sorting:
- Subtract one PE file from another!☆20Updated 4 years ago
- ☆57Updated 5 months ago
- allowing um r/w through km from um ioctl ™☆11Updated 3 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆27Updated 4 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆24Updated 2 years ago
- INF Studio for easier working with driver installation files☆38Updated 2 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆35Updated 4 years ago
- Yet another Windows DLL injector.☆39Updated 3 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- Dump mapped PE files from memory to the disk☆20Updated 6 years ago
- BITS Transfers Manager☆44Updated 5 months ago
- Example/starter code for custom Windows application compatibility shims☆35Updated 4 years ago
- vmware-backdoor☆33Updated 4 years ago
- Runs programs as TrustedInstaller☆49Updated 6 years ago
- Taking advantage of CRT initialization, to get away with hooking protected applications☆47Updated 3 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆64Updated last year
- A Windows API hooking library !☆31Updated 3 years ago
- ☆26Updated 3 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆10Updated 3 years ago
- ☆26Updated 3 months ago
- A set of small utilities, helpers for PIN tracers☆35Updated last month
- ☆59Updated 3 years ago
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆32Updated 3 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Updated 3 years ago
- ☆40Updated 8 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Updated 6 years ago
- Bypassing kernel patch protection runtime☆20Updated 2 years ago
- Remote PE reflective injection with a simple reflective loader☆32Updated 6 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆22Updated 4 years ago
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago