guillaC / WMI-Viewer
simple WMI Viewer
☆21Updated 4 years ago
Alternatives and similar repositories for WMI-Viewer:
Users that are interested in WMI-Viewer are comparing it to the libraries listed below
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆33Updated 5 years ago
- Fake Timestamps of Driver Certificates while keeping validity.☆17Updated 3 years ago
- Process Creation, Image Load and Thread Creation Notification☆12Updated last year
- Driver Loader/BE Bypass/Win Malware(lol)☆34Updated 5 years ago
- ☆14Updated 12 years ago
- A tool to show the method info at runtime☆13Updated 5 years ago
- A Proof-of-Concept implementation for Proxy Object Obfuscation in .NET☆47Updated 2 years ago
- Small project to generate fake DLLs based on an executable's import table☆23Updated 4 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆10Updated 2 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆27Updated 6 years ago
- A Windows native DLL injection library written in C# that supports several methods of injection.☆13Updated 6 years ago
- x86/x64 dll injector☆30Updated 2 years ago
- Code Injection technique written in cpp language☆31Updated 7 years ago
- A template for projects using both libPeConv and MS Detours☆15Updated last year
- Win32 PE Anti-RE and Anti-debugging Framework☆13Updated 5 years ago
- Simple tool to check visual studio project files for Exec, PreBuildEvent and PostBuildEvent☆13Updated 4 years ago
- An attempt at reversing WindowsDefender☆20Updated 6 months ago
- x64 injector using LoadLibrary made in assembler (MASM)☆26Updated 6 years ago
- .net based packer/obfuscator with apc based pe injection☆15Updated 9 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Updated 4 years ago
- Using Thread Description To Hide Shellcodes☆14Updated 2 years ago
- Remote memory library in C++17.☆31Updated 6 years ago
- Static library and headers for linking your software with ntdll.dll☆32Updated 5 years ago
- Plugin to patch and remove ASLR from PE files on x64dbg☆38Updated 2 years ago
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆24Updated 3 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆11Updated 4 years ago
- Bypass UAC by abusing shell protocol handlers☆14Updated 3 years ago
- x64 Windows privilege elevation using anycall☆21Updated 3 years ago
- Analysing and defeating PatchGuard universally☆34Updated 4 years ago