hardcpp / PacketStudio
Complete environement for network injected reversing
☆21Updated 8 years ago
Alternatives and similar repositories for PacketStudio:
Users that are interested in PacketStudio are comparing it to the libraries listed below
- ☆25Updated 7 years ago
- Spoof Windows Test Signing Mode☆29Updated 6 years ago
- A Windows driver used to facilitate DLL injection☆24Updated 7 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Updated 9 years ago
- ice9 - is anticheat based on usermode tricks and undocumented methods , builded as dll for loading trought the shibari framework☆19Updated 6 years ago
- p2c loader(this is also the loader isolation.top used)☆14Updated 7 years ago
- ☆25Updated 7 years ago
- XEDParse emulator based on asmjit/asmtk.☆22Updated 9 months ago
- ☆11Updated 6 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆25Updated 10 years ago
- just an lite AntiRootkit for interesting☆23Updated 9 years ago
- Kernel Inject Process☆11Updated 7 years ago
- Capstone disassembly/disassembler framework: Core (Arm, Arm64, M68K, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, J…☆14Updated 5 years ago
- ☆12Updated 5 months ago
- Wow64 syscall hook☆40Updated 7 years ago
- A driverless driver that is supposed to be manually mapped, usually by using TDL exploit. The driver shows how to read/write to any proce…☆21Updated 7 years ago
- ☆23Updated 7 years ago
- Disable Driver Callbacks☆9Updated 7 years ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago
- PE rebuilder, based on yoda's realigndll☆11Updated 13 years ago
- An ark tool's driver☆40Updated 7 years ago
- by others☆37Updated 6 years ago
- Simple program for static hooking dynamic libraries in executable application☆21Updated 11 years ago
- Automatically exported from code.google.com/p/guardlite☆11Updated 9 years ago
- UI application that can compare PE images in memory or in raw PE file☆17Updated 10 years ago