jacobstanley / patch-iatLinks
Provides the ability to patch/hook functions imported by a dll or executable
☆34Updated 15 years ago
Alternatives and similar repositories for patch-iat
Users that are interested in patch-iat are comparing it to the libraries listed below
Sorting:
- Loading a native DLL in the memory.☆70Updated 7 years ago
- An example pattern in C# for using WMI to monitor process creation and termination events.☆52Updated 7 years ago
- .NET executable packer☆62Updated 6 years ago
- Simple PE packer with RtlCompressBuffer☆21Updated 10 years ago
- Managed wrappers around the Windows API and some Native API☆35Updated 7 years ago
- Sample libraries to be used with IAT Patcher☆36Updated 3 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆57Updated 9 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆27Updated 9 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 10 years ago
- Class implementation of PowerLoader injection technique☆32Updated 8 years ago
- Anti-AV compilation☆44Updated 12 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆57Updated 6 years ago
- Code Injector Using Code Caves☆15Updated 10 years ago
- PoC for detecting and dumping process hollowing code injection☆52Updated 6 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆66Updated 12 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 7 years ago
- Windows kernel-mode callbacks tutorial driver☆47Updated 9 years ago
- CmdDesktopSwitch is a small utility that lists all windows desktops and provides the option to switch between them. This can be used to i…☆35Updated 9 years ago
- Analyze and attack windows applications using dll hijacking vulnerabilities☆59Updated 6 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Updated 10 years ago
- Common Malware Techniques☆13Updated 2 years ago
- ☆34Updated 8 years ago
- Diff tool for comparing symbols in PDB files☆84Updated 5 years ago
- DLL Injection Library & Tools☆73Updated 9 years ago
- Reflective DLL Injection style process infector☆20Updated 7 years ago
- A ConfuserEx-custom deobfuscation toolchain☆52Updated 8 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆28Updated 11 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago