guillaC / WMI-Viewer
simple WMI Viewer
☆21Updated 4 years ago
Alternatives and similar repositories for WMI-Viewer
Users that are interested in WMI-Viewer are comparing it to the libraries listed below
Sorting:
- Deobfuscator for remove proxy calls methods☆25Updated 2 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆33Updated 5 years ago
- ☆14Updated 12 years ago
- A specialized C# memory-accessing library☆43Updated 6 years ago
- Bypass UAC by abusing shell protocol handlers☆14Updated 3 years ago
- Code Injection technique written in cpp language☆31Updated 7 years ago
- Small project to generate fake DLLs based on an executable's import table☆23Updated 5 years ago
- Undocumented way of fetching list of processes by bruteforcing NtQuerySystemInformation☆16Updated 7 years ago
- A Proof-of-Concept implementation for Proxy Object Obfuscation in .NET☆47Updated 2 years ago
- A basic .NET obfuscator uses dnlib, Modded KoiVM on decryption methods. Not stable for now, works on "crack me" executables.☆26Updated 3 years ago
- x86/x64 dll injector☆30Updated 3 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆10Updated 2 years ago
- A kernel mode Windows rootkit in development.☆48Updated 3 years ago
- .net based packer/obfuscator with apc based pe injection☆15Updated 9 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Updated 4 years ago
- Static library and headers for linking your software with ntdll.dll☆32Updated 5 years ago
- A tool to show the method info at runtime☆13Updated 5 years ago
- Process Creation, Image Load and Thread Creation Notification☆12Updated last year
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆28Updated 3 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆39Updated 4 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆24Updated 3 years ago
- A class to gather information about a process, its threads and modules.☆24Updated 5 years ago
- Rebuild of the original Remote Admin Tool☆9Updated 5 years ago
- An example of PE hollowing injection technique☆23Updated 5 years ago
- An attempt at reversing WindowsDefender☆20Updated 7 months ago
- Windows PDB Parser using Imagehlp library.☆16Updated 2 years ago
- Silent Monero (XMR) CPU miner☆23Updated 6 years ago
- JITK - JIT Killer is hooker for clrjit☆29Updated 2 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Updated 7 years ago
- A tool to automatically defeat .NET crackmes based on string equality comparisons☆18Updated 3 years ago