dr4k0nia / DontPoisonMySource
Simple tool to check visual studio project files for Exec, PreBuildEvent and PostBuildEvent
☆12Updated 4 years ago
Alternatives and similar repositories for DontPoisonMySource:
Users that are interested in DontPoisonMySource are comparing it to the libraries listed below
- Мутация PE x86☆15Updated 5 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆43Updated 3 years ago
- Скрытие строки от отладчиков и декомпиляторов☆50Updated 5 years ago
- Elevate arbitrary MSR writes to kernel execution.☆32Updated last year
- x64 Windows privilege elevation using anycall☆21Updated 3 years ago
- Bypassing kernel patch protection runtime☆19Updated 2 years ago
- working injector bp (BE EAC & VANGUARD)☆4Updated 3 years ago
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆48Updated last year
- MazzCrypt - You won't ever get caught. A [was-private] polymorphic source code parser to randomize executables. Inspired by PolyLoader by…☆12Updated 8 years ago
- A manual PE mapping implementation, aka reflective loader☆18Updated 2 years ago
- Simple website to automatically generate string encryption/decryption routines for C#☆9Updated 3 years ago
- ☆58Updated 2 years ago
- Function hooks in Windows NT Kernel☆21Updated 4 years ago
- driver interface with dll-injection capabilities☆28Updated 4 years ago
- Simple driver loader for windows☆18Updated 4 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆28Updated 4 years ago
- ☆29Updated 3 years ago
- Fake Timestamps of Driver Certificates while keeping validity.☆16Updated 3 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆24Updated 5 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Updated 5 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆42Updated 6 years ago
- PAGE_GUARD based hooking library☆42Updated 2 years ago
- CTF writeups☆35Updated 3 months ago
- (DEPRECATED) A simple anti-anti debug library for Windows☆29Updated 4 years ago
- Injector with kernel power☆16Updated 4 years ago
- A small library to extend the functionality of GetModuleHandle and GetProcAddress to other processes☆17Updated 4 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆24Updated 3 years ago
- Hooking Shadow and normal SSDT with Kaspersky Hypervisor and abusing alignment☆23Updated 4 years ago
- Deobfuscator for remove proxy calls methods☆24Updated 2 years ago