jacobstanley / patch-iatLinks
Provides the ability to patch/hook functions imported by a dll or executable
☆35Updated 15 years ago
Alternatives and similar repositories for patch-iat
Users that are interested in patch-iat are comparing it to the libraries listed below
Sorting:
- Loading a native DLL in the memory.☆70Updated 7 years ago
- Managed wrappers around the Windows API and some Native API☆34Updated 7 years ago
- .NET executable packer☆62Updated 7 years ago
- Simple PE packer with RtlCompressBuffer☆21Updated 10 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆58Updated 7 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆57Updated 9 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆28Updated 9 years ago
- An example pattern in C# for using WMI to monitor process creation and termination events.☆53Updated 7 years ago
- injects a DLL into a running process or starts a process with DLL being the very first one imported.☆34Updated 13 years ago
- Anti-AV compilation☆44Updated 12 years ago
- Windows kernel-mode callbacks tutorial driver☆47Updated 9 years ago
- PoC for detecting and dumping process hollowing code injection☆53Updated 7 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆29Updated 11 years ago
- Code Injector Using Code Caves☆15Updated 10 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- A session-0 capable dll injection utility☆76Updated 7 years ago
- Sample libraries to be used with IAT Patcher☆36Updated 3 years ago
- Plugin for Process Hacker 2 ( https://github.com/processhacker2 ), displays system hooks and able to unhook too.☆52Updated 7 years ago
- ☆21Updated 8 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 10 years ago
- Class implementation of PowerLoader injection technique☆32Updated 8 years ago
- ☆34Updated 8 years ago
- Diff tool for comparing symbols in PDB files☆84Updated 5 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆35Updated 8 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 7 years ago
- MSI NTIOLib/WinIO Local Privilege Escalation exploit☆96Updated 9 years ago
- Inject and detour DLLs and program functions both managed and unmanaged in other programs, written (almost) purely in C#. [Not maintained…☆37Updated 11 years ago
- Kernel mode driver loader, injecting into the windows kernel, Rootkit. Driver injections.☆48Updated 11 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆65Updated 13 years ago