jacobstanley / patch-iat
Provides the ability to patch/hook functions imported by a dll or executable
☆34Updated 14 years ago
Alternatives and similar repositories for patch-iat:
Users that are interested in patch-iat are comparing it to the libraries listed below
- Loading a native DLL in the memory.☆69Updated 6 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆58Updated 8 years ago
- An example pattern in C# for using WMI to monitor process creation and termination events.☆52Updated 6 years ago
- ☆22Updated 4 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆56Updated 6 years ago
- Managed wrappers around the Windows API and some Native API☆34Updated 6 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 6 years ago
- A specialized C# memory-accessing library☆43Updated 6 years ago
- Analyze and attack windows applications using dll hijacking vulnerabilities☆56Updated 5 years ago
- Simple PE packer with RtlCompressBuffer☆21Updated 9 years ago
- Anti-AV compilation☆42Updated 11 years ago
- PoC for detecting and dumping process hollowing code injection☆51Updated 6 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆26Updated 8 years ago
- Class implementation of PowerLoader injection technique☆29Updated 8 years ago
- CmdDesktopSwitch is a small utility that lists all windows desktops and provides the option to switch between them. This can be used to i…☆34Updated 8 years ago
- Plugin for Process Hacker 2 ( https://github.com/processhacker2 ), displays system hooks and able to unhook too.☆49Updated 7 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 9 years ago
- Inject and detour DLLs and program functions both managed and unmanaged in other programs, written (almost) purely in C#. [Not maintained…☆38Updated 11 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 7 years ago
- Anti-.NET Malware/Packers - Detect most .NET Packers (and some native) used for malware.☆24Updated 7 years ago
- User-mode hook bypassing method☆33Updated 8 years ago
- .NET instrumentation framework☆72Updated 7 years ago
- Windows kernel-mode callbacks tutorial driver☆47Updated 8 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Updated 7 years ago
- ☆45Updated 6 years ago
- ☆16Updated 7 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 8 years ago
- ☆21Updated 8 years ago
- IDA Pro plug-in and tools for displaying 3D graphs of procedures using UbiGraph☆25Updated 11 years ago
- A ConfuserEx-custom deobfuscation toolchain☆51Updated 7 years ago