jacobstanley / patch-iat
Provides the ability to patch/hook functions imported by a dll or executable
☆34Updated 14 years ago
Alternatives and similar repositories for patch-iat:
Users that are interested in patch-iat are comparing it to the libraries listed below
- Loading a native DLL in the memory.☆70Updated 7 years ago
- Plugin for Process Hacker 2 ( https://github.com/processhacker2 ), displays system hooks and able to unhook too.☆49Updated 7 years ago
- CmdDesktopSwitch is a small utility that lists all windows desktops and provides the option to switch between them. This can be used to i…☆34Updated 8 years ago
- Sample libraries to be used with IAT Patcher☆33Updated 2 years ago
- ☆22Updated 4 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆58Updated 8 years ago
- A specialized C# memory-accessing library☆43Updated 6 years ago
- Simple PE packer with RtlCompressBuffer☆21Updated 9 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆56Updated 6 years ago
- Anti-AV compilation☆42Updated 11 years ago
- An example pattern in C# for using WMI to monitor process creation and termination events.☆52Updated 6 years ago
- PoC for detecting and dumping process hollowing code injection☆51Updated 6 years ago
- Windows kernel-mode callbacks tutorial driver☆47Updated 8 years ago
- .NET executable packer☆63Updated 6 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 8 years ago
- Managed wrappers around the Windows API and some Native API☆34Updated 6 years ago
- Analyze and attack windows applications using dll hijacking vulnerabilities☆56Updated 5 years ago
- Win32 memory leak detector with ETW☆41Updated 7 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆26Updated 8 years ago
- ☆101Updated 8 years ago
- Diff tool for comparing export tables in PE images☆24Updated 5 years ago
- ☆33Updated 7 years ago
- ☆22Updated 4 years ago
- injects a DLL into a running process or starts a process with DLL being the very first one imported.☆35Updated 12 years ago
- .NET instrumentation framework☆72Updated 7 years ago
- Summit Route End Point Protection - Client code☆17Updated 8 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- DotNetPluginCS based on:☆20Updated 3 weeks ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- Simple standalone bundle of NT core APIs☆26Updated 9 years ago