hasherezade / sig_finder
Signature finder (from PE-bear)
☆29Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for sig_finder
- ☆27Updated 2 years ago
- silence file system monitoring components by hooking their minifilters☆51Updated 9 months ago
- ☆57Updated 2 years ago
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated last year
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆48Updated last year
- An example of how to use Microsoft Windows Warbird technology☆25Updated last year
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆21Updated last year
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆24Updated 5 years ago
- Neutralize KEPServerEX anti-debugging techniques☆31Updated last year
- Detours implementation (x64/x86) which used only ntdll import☆88Updated 5 months ago
- C/C++ antidebugging library for 32 and 64 bit processors☆12Updated 4 months ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆36Updated 2 years ago
- Windows kernel driver template for cmkr and llvm-msvc.☆33Updated 11 months ago
- FastSymApi - A Fast API PDB Symbol Cache Server that efficiently caches and compresses PDBs on disk for quick and repeated retrieval.☆18Updated last month
- ☆25Updated 3 years ago
- Example of building an application verifer DLL☆44Updated 5 months ago
- ☆17Updated 3 years ago
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆46Updated last year
- XOrCryptEx lightweight C Utility/Algorithm☆11Updated 2 years ago
- An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit☆23Updated 3 years ago
- ☆13Updated last year
- Fully working kernel-mode VAC bypass☆39Updated 3 weeks ago
- A VMWare logger using built-in backdoor.☆25Updated last month
- An obfuscation tool for Windows which instruments the Windows Loader into acting as an unpacking engine.☆17Updated 6 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆24Updated 2 years ago
- Windows PDB Parser using Imagehlp library.☆16Updated 2 years ago
- Bypassing kernel patch protection runtime☆19Updated last year
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆33Updated 2 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year