hidd3ncod3s / DecryptEKbinary
Decrypt the initial dropper of various exploit kits
☆10Updated 7 years ago
Alternatives and similar repositories for DecryptEKbinary:
Users that are interested in DecryptEKbinary are comparing it to the libraries listed below
- does reflective dll injection☆8Updated 11 years ago
- wow64 syscall filter☆13Updated 10 years ago
- Windows registry files interactive viewer☆9Updated 7 years ago
- ShellcodeOS☆10Updated 8 years ago
- Lists work items being queued currently.☆13Updated 9 years ago
- ☆9Updated 7 years ago
- ☆12Updated 10 years ago
- Artificial intelligence (AI, also machine intelligence, MI) is intelligence exhibited by machines, rather than humans or other animals (n…☆6Updated 7 years ago
- ☆7Updated 8 years ago
- This repository is a clne of the new cuckoo monitor where I added some stuff to get the calling address for every hooked API☆8Updated 8 years ago
- Google Drive windows virtual unit☆9Updated 11 years ago
- Debug Bootkit Tool Source☆9Updated 7 years ago
- ☆10Updated 10 years ago
- FaultInjection Project☆7Updated 8 years ago
- Project for Injecting into Windows Processes☆13Updated 12 years ago
- PE32 binary + W32 payload☆12Updated 7 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 9 years ago
- A project dedicated towards researching the Windows operating system's kernel mode enviornment.☆8Updated 9 years ago
- ☆8Updated 7 years ago
- ☆7Updated 7 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Updated 7 years ago
- Cross-referencing network communication for detecting Advanced Persistent Threat (APT) malware☆6Updated 9 years ago
- windows内核小工具,包含APP和driver☆11Updated 10 years ago
- Windows device tree walker☆15Updated 6 years ago
- A tiny library that lets you draw on Windows desktop.☆9Updated 8 years ago
- ☆12Updated 8 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆10Updated 9 years ago
- Common Malware Techniques☆13Updated last year
- ☆9Updated 8 years ago
- an efficient yet easy to use network packet builder and parser☆11Updated 7 years ago