eladyesh / Anti_VirusLinks
☆12Updated last year
Alternatives and similar repositories for Anti_Virus
Users that are interested in Anti_Virus are comparing it to the libraries listed below
Sorting:
- Activate Windows & Office 🔑☆13Updated last year
- A simple UEFI bootkit made by @NSG650 and me.☆26Updated 11 months ago
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆14Updated 8 months ago
- An x64dbg plugin which marks XFG call signatures as data☆78Updated 2 years ago
- Sample for Creating a new kernel object type and supporting API☆26Updated last year
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆99Updated 6 months ago
- Lightweight Threat Detection System - (Base)☆15Updated last year
- windows rootkit☆59Updated last year
- Generate a PDB file given the old PDB file and an address mapping☆49Updated 3 months ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆68Updated 2 months ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆82Updated 8 months ago
- Hooking Heavens Gate in a weekend☆13Updated 3 years ago
- ☆51Updated 8 months ago
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆85Updated 3 weeks ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆27Updated 2 years ago
- Virtual Trust Level (VTL 1) secure call tracing☆83Updated 3 months ago
- Delphi-Kawaii is a plugin for Ida Pro.☆21Updated 2 years ago
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆45Updated last year
- Bypassing kernel patch protection runtime☆20Updated 2 years ago
- 正确解析 _HEAP_VS_***符号 ,支持在最新win11 24h2 运行,替换windbg自带的!pool命令☆17Updated last year
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆26Updated 6 months ago
- ☆28Updated last month
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆41Updated 5 months ago
- x86 and x64 assembly "read-eval-print loop" for Windows☆33Updated 8 years ago
- Research on obfuscated licensing APIs / CLIP service in the Windows kernel☆125Updated 3 years ago
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆32Updated 3 years ago
- Contains all the applications developed for the Second part of the 7th Edition of Windows Internals book☆114Updated last year
- A journal for $6,000 Riot Vanguard bounty.☆66Updated 2 years ago
- ☆14Updated 2 years ago
- Simple example for getting started with eBPF for Windows☆48Updated 9 months ago