ihack4falafel / ROR13HashGeneratorLinks
C# implementation to produce ROR-13 numeric hash for given function API name
☆32Updated 6 years ago
Alternatives and similar repositories for ROR13HashGenerator
Users that are interested in ROR13HashGenerator are comparing it to the libraries listed below
Sorting:
- Windows API Hashes used in the malwares☆42Updated 9 years ago
- Monitors ETW for security relevant syscalls maintaining the set called by each unique process☆79Updated 2 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- ☆113Updated 2 years ago
- Clone running process with ZwCreateProcess☆57Updated 4 years ago
- LPE exploit for CVE-2023-36802☆22Updated last year
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆111Updated 3 years ago
- Next gen process injection technique☆54Updated 4 years ago
- Windows process injection methods☆17Updated 5 years ago
- ☆25Updated last year
- A collection of shellcode hashes☆17Updated 6 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆76Updated 3 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆46Updated last year
- ☆82Updated 9 months ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆112Updated 4 years ago
- Unpacker for donut shellcode☆17Updated 5 years ago
- ☆70Updated 4 months ago
- Command like tool to print mitigation flags for running processes in a memory dump☆46Updated 4 years ago
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process