ihack4falafel / ROR13HashGenerator
C# implementation to produce ROR-13 numeric hash for given function API name
☆31Updated 5 years ago
Alternatives and similar repositories for ROR13HashGenerator:
Users that are interested in ROR13HashGenerator are comparing it to the libraries listed below
- Windows API Hashes used in the malwares☆40Updated 9 years ago
- Monitors ETW for security relevant syscalls maintaining the set called by each unique process☆54Updated last year
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆24Updated last year
- ☆24Updated last year
- ☆25Updated 2 months ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆73Updated 3 years ago
- A collection of shellcode hashes☆17Updated 6 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- Inject unsigned DLL into Protected Process Light (PPL)☆19Updated last month
- LPE exploit for CVE-2023-36802☆23Updated last year
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆102Updated 3 years ago
- A simple but useful project maybe help you reverse Windows.☆34Updated 9 months ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆96Updated 4 years ago
- Enabled / Disable LSA Protection via BYOVD☆65Updated 3 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆114Updated 6 months ago
- Helper idapython code for reversing kmdf drivers☆71Updated 2 years ago
- Inter-Process Communication Mechanisms☆26Updated 4 years ago
- ☆31Updated 2 years ago
- ☆105Updated 2 years ago
- ☆49Updated 3 months ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆27Updated 2 weeks ago
- Clone running process with ZwCreateProcess☆58Updated 4 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 2 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆86Updated 3 years ago
- ☆62Updated 2 years ago
- Finding Truth in the Shadows☆85Updated last year
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆90Updated 2 years ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆28Updated 2 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆95Updated last year