hotnops / RemoteDebugViewLinks
A DLL that serves OutputDebugString content over a TCP connection
☆35Updated 4 years ago
Alternatives and similar repositories for RemoteDebugView
Users that are interested in RemoteDebugView are comparing it to the libraries listed below
Sorting:
- ☆24Updated 4 years ago
- A tool to create COM class/interface relationships in neo4j☆50Updated 3 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Updated 4 years ago
- ☆16Updated 4 years ago
- ☆19Updated 5 years ago
- A small library helping to parse commandline parameters (for C/C++)☆58Updated 8 months ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆25Updated 5 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
- Clone running process with ZwCreateProcess☆59Updated 5 years ago
- A small commented POC for removing API hooks placed by AV/EDR.☆34Updated 5 years ago
- An opensource API hooking framework☆22Updated 6 years ago
- ☆31Updated 5 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Updated 5 years ago
- ☆37Updated 4 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 3 years ago
- Small visualizator for PE files☆70Updated 2 years ago
- PE File Blessing - To continue or not to continue☆87Updated 6 years ago
- Visual Studio (C++) Solution Template for Payloads☆18Updated 6 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆58Updated 5 months ago
- ☆24Updated 4 years ago
- AMSI detection PoC☆31Updated 5 years ago
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆36Updated 4 years ago
- Tool to manage user privileges☆31Updated 6 years ago
- ☆12Updated 6 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Updated 8 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Updated 7 years ago