Simple KDMapper driver dumper. Unlike other dumpers, this dumper dumps the PE headers of the image too.
☆16May 10, 2024Updated last year
Alternatives and similar repositories for KDMapper-Dumper
Users that are interested in KDMapper-Dumper are comparing it to the libraries listed below
Sorting:
- ☆36Feb 12, 2026Updated 2 weeks ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Windows Kernel API wrapper with simplified functions and enterprise driver extensions.☆33Jul 8, 2025Updated 7 months ago
- Create and find signatures in Binary Ninja☆28Oct 7, 2023Updated 2 years ago
- Kernel ReClassEx☆68Nov 21, 2023Updated 2 years ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.☆30Nov 9, 2021Updated 4 years ago
- Signature finder (from PE-bear)☆40Aug 25, 2025Updated 6 months ago
- ☆19Updated this week
- Advanced Rust code virtualization and obfuscation framework☆28Dec 16, 2025Updated 2 months ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- ☆20Jul 14, 2025Updated 7 months ago
- One-line Image Generating Program Based on the Bing Image Createor (Powered by DALL·E 3), `pip install bing_brush`, that's it!☆11Apr 23, 2024Updated last year
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- ☆13Jun 29, 2023Updated 2 years ago
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆49Nov 10, 2024Updated last year
- Cracking hashes using AWS GPU instances☆10Sep 4, 2017Updated 8 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Apr 26, 2018Updated 7 years ago
- Cobaltstrike UDRL with memory evasion☆15May 16, 2024Updated last year
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- Simple python3 script to automate CVE-2018-9995☆11Feb 20, 2024Updated 2 years ago
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Sep 15, 2022Updated 3 years ago
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆10Apr 29, 2025Updated 9 months ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- ☆12Apr 26, 2022Updated 3 years ago