hasherezade / pesieve-goLinks
Golang bindings for PE-sieve
☆42Updated 2 years ago
Alternatives and similar repositories for pesieve-go
Users that are interested in pesieve-go are comparing it to the libraries listed below
Sorting:
- ☆38Updated 2 years ago
- Unpacker for donut shellcode☆18Updated 5 years ago
- Small tool to play with IOCs caused by Imageload events☆43Updated 2 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated 2 years ago
- ☆12Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆68Updated 3 years ago
- Linux Sleep Obfuscation☆108Updated last year
- A more reliable way of resolving syscall numbers in Windows☆52Updated last year
- A Poc on blocking Procmon from monitoring network events☆109Updated 4 months ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆110Updated 10 months ago
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- ☆24Updated 10 months ago
- Bypass Malware Time Delays☆108Updated 3 years ago
- miscellaneous codes☆36Updated 2 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆58Updated 2 years ago
- Repo containing my public talks☆23Updated 2 years ago
- ☆76Updated 3 years ago
- ☆30Updated 4 months ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Updated 3 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Updated 2 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- ☆27Updated last year
- ☆17Updated 2 years ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆105Updated last year
- A simple Linux in-memory .so loader☆33Updated 2 years ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆52Updated 2 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Updated 2 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated 2 years ago
- ☆34Updated 2 years ago