guillaC / WMI-Viewer
simple WMI Viewer
☆20Updated 4 years ago
Alternatives and similar repositories for WMI-Viewer:
Users that are interested in WMI-Viewer are comparing it to the libraries listed below
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆31Updated 5 years ago
- Simple tool to check visual studio project files for Exec, PreBuildEvent and PostBuildEvent☆11Updated 4 years ago
- .net debugger / msil interpreter / emulator☆16Updated 6 years ago
- Signature scanner and API hooks to detect malicious process injection☆22Updated last year
- Code Injection technique written in cpp language☆31Updated 7 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆38Updated 4 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆27Updated 6 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- Remote PE reflective injection with a simple reflective loader☆30Updated 5 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆13Updated 5 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆9Updated 2 years ago
- A tool to show the method info at runtime☆12Updated 5 years ago
- A class to gather information about a process, its threads and modules.☆24Updated 4 years ago
- Rebuild of the original Remote Admin Tool☆9Updated 4 years ago
- Static library and headers for linking your software with ntdll.dll☆31Updated 5 years ago
- Deobfuscator for remove proxy calls methods☆22Updated last year
- XOrCryptEx lightweight C Utility/Algorithm☆11Updated 2 years ago
- ☆14Updated 12 years ago
- Collection of Win32 with C++/Assembly for Hooking, Patch and Reversing PE file☆10Updated 2 years ago
- Small project to generate fake DLLs based on an executable's import table☆23Updated 4 years ago
- Windows x64 Process Scanner to detect application compatability shims☆36Updated 6 years ago
- A basic .NET obfuscator uses dnlib, Modded KoiVM on decryption methods. Not stable for now, works on "crack me" executables.☆26Updated 3 years ago
- An example of PE hollowing injection technique☆23Updated 5 years ago
- A POC for Windows Extension Host hooking☆22Updated 5 years ago