herrcore / CmdDesktopSwitch
CmdDesktopSwitch is a small utility that lists all windows desktops and provides the option to switch between them. This can be used to identify and watch malware that has created a hidden desktop.
☆33Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for CmdDesktopSwitch
- Sample libraries to be used with IAT Patcher☆33Updated 2 years ago
- ☆21Updated 3 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆54Updated 6 years ago
- CAPE monitor DLLs☆38Updated 4 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 7 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆59Updated 8 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆37Updated 11 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆36Updated 7 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆73Updated 10 years ago
- ☆33Updated 7 years ago
- Anti-AV compilation☆42Updated 11 years ago
- PoC for detecting and dumping process hollowing code injection☆50Updated 6 years ago
- Evil Reflective DLL Injection Finder☆45Updated 5 years ago
- DLL Injection Library & Tools☆70Updated 8 years ago
- Blog posts☆30Updated 4 years ago
- Simple PE packer with RtlCompressBuffer☆21Updated 9 years ago
- A ready-made template for a project based on libpeconv.☆41Updated last month
- ☆41Updated 6 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 6 years ago
- Modified edition of cuckoomon☆48Updated 6 years ago
- a program to detect reflective dll injection on a live machine☆74Updated 8 years ago
- Decodes PlugX traffic and encrypted/compressed artifacts☆38Updated 11 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆50Updated 6 years ago
- IDAPython scripts☆15Updated 7 years ago
- ☆16Updated 7 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago