hasherezade / pin_n_sieveView external linksLinks
An experimental dynamic malware unpacker based on Intel Pin and PE-sieve
☆63Aug 21, 2024Updated last year
Alternatives and similar repositories for pin_n_sieve
Users that are interested in pin_n_sieve are comparing it to the libraries listed below
Sorting:
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- MalUnpack companion driver☆99Jun 17, 2024Updated last year
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆581Mar 8, 2024Updated last year
- [deprecated] Simple x64dbg plugin to save a full memory dump☆50Oct 10, 2022Updated 3 years ago
- ☆18Apr 4, 2019Updated 6 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Oct 17, 2018Updated 7 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆109May 27, 2021Updated 4 years ago
- c++ implementation of windows heavens gate☆70Feb 12, 2021Updated 5 years ago
- Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction wit…☆218Feb 20, 2023Updated 2 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Jan 8, 2022Updated 4 years ago
- Triton based symbolic emulator☆16Oct 30, 2022Updated 3 years ago
- A kernel mode Windows rootkit in development.☆49Dec 31, 2021Updated 4 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago
- ☆29Jan 15, 2021Updated 5 years ago
- x64dbg scripts for finding OEP of packers☆15Oct 22, 2018Updated 7 years ago
- Interprocess communication library, providing the ability to call functions from each other☆20Oct 3, 2019Updated 6 years ago
- 2022 Updated Kernelmode-Code☆33Mar 23, 2024Updated last year
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆42May 9, 2019Updated 6 years ago
- Windows System Programming Experiments☆223Jun 13, 2022Updated 3 years ago
- Universal x86/x64 VMProtect 2.0-3.X Import fixer☆20Dec 29, 2021Updated 4 years ago
- sc4cpp is a shellcode framework based on C++☆95Aug 29, 2021Updated 4 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆228Mar 22, 2023Updated 2 years ago
- PoC memory injection detection agent based on ETW, for offensive and defensive research purposes☆298Apr 10, 2021Updated 4 years ago
- Set of my small utils related to cryptography, encoding, decoding etc☆93Sep 1, 2025Updated 5 months ago
- Demos of various (also non standard) persistence methods used by malware☆224Mar 5, 2023Updated 2 years ago
- Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.☆80May 3, 2023Updated 2 years ago
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated last year
- Standalone Metasploit-like XOR encoder for shellcode☆50May 12, 2024Updated last year
- Bypasses for Windows kernel callbacks PatchGuard protection☆44Aug 15, 2021Updated 4 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆183Nov 30, 2017Updated 8 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- Windows CIFS/SMB packet generation and SMB networking library☆12Aug 25, 2020Updated 5 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- Various shellcodes☆13Sep 1, 2020Updated 5 years ago
- Evasive Process Hollowing Techniques☆142Aug 16, 2020Updated 5 years ago