jacobstanley / patch-iatLinks
Provides the ability to patch/hook functions imported by a dll or executable
☆34Updated 15 years ago
Alternatives and similar repositories for patch-iat
Users that are interested in patch-iat are comparing it to the libraries listed below
Sorting:
- Loading a native DLL in the memory.☆69Updated 7 years ago
- Managed wrappers around the Windows API and some Native API☆35Updated 7 years ago
- Simple PE packer with RtlCompressBuffer☆21Updated 9 years ago
- Diff tool for comparing symbols in PDB files☆83Updated 5 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆57Updated 6 years ago
- Anti-AV compilation☆44Updated 11 years ago
- Windows kernel-mode callbacks tutorial driver☆47Updated 9 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆58Updated 9 years ago
- An example pattern in C# for using WMI to monitor process creation and termination events.☆52Updated 7 years ago
- ☆39Updated 12 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆27Updated 9 years ago
- .NET instrumentation framework☆72Updated 7 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- Sample libraries to be used with IAT Patcher☆34Updated 2 years ago
- Plugin for Process Hacker 2 ( https://github.com/processhacker2 ), displays system hooks and able to unhook too.☆52Updated 7 years ago
- ☆23Updated 4 years ago
- PoC for detecting and dumping process hollowing code injection☆52Updated 6 years ago
- .NET executable packer☆62Updated 6 years ago
- ☆21Updated 9 years ago
- injects a DLL into a running process or starts a process with DLL being the very first one imported.☆33Updated 12 years ago
- Win32 memory leak detector with ETW☆46Updated 7 years ago
- Provides a way which you can load a .NET dll/exe from disk, modify/inject IL, and then run the assembly all in memory without modifying t…☆30Updated 8 years ago
- ☆34Updated 7 years ago
- Class implementation of PowerLoader injection technique☆32Updated 8 years ago
- Diff tool for comparing export tables in PE images☆24Updated 5 years ago
- ☆106Updated 9 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆65Updated 12 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 9 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago
- User-mode hook bypassing method☆33Updated 9 years ago