Provides the ability to patch/hook functions imported by a dll or executable
☆35May 31, 2010Updated 15 years ago
Alternatives and similar repositories for patch-iat
Users that are interested in patch-iat are comparing it to the libraries listed below
Sorting:
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Mar 3, 2016Updated 9 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- Static DLL Patching and Hooking System☆25Sep 30, 2015Updated 10 years ago
- analyze the content of the pe file on windows, and shell(pack) function for windows drivers.☆11Nov 9, 2018Updated 7 years ago
- ☆11Mar 11, 2015Updated 10 years ago
- User-mode kernel callback framework☆10Nov 16, 2013Updated 12 years ago
- Windows aero overlay with Direct2D & DirectWrite support☆11May 1, 2016Updated 9 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- A library to install/uninstall NDIS driver on Windows☆15Jul 15, 2015Updated 10 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- A library for intercepting native functions by hooking KiFastSystemCall☆74Apr 6, 2020Updated 5 years ago
- Python script to patch the reflective stub in a DLL☆24Apr 9, 2017Updated 8 years ago
- Fuzzer☆43Oct 18, 2014Updated 11 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Oct 10, 2014Updated 11 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Apr 13, 2015Updated 10 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆15Sep 19, 2015Updated 10 years ago
- Windows inject☆16Jun 7, 2018Updated 7 years ago
- 进程保护、进程过滤的小工程、主要亮点是在内核中对操作系统中的用户进行管理☆16Nov 5, 2014Updated 11 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago
- The dll that can hide itself and then delete itselft.☆32Mar 31, 2013Updated 12 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Jan 13, 2016Updated 10 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆28Apr 2, 2016Updated 9 years ago
- library, which help to describe or load and execute PE files.☆55Jun 23, 2013Updated 12 years ago
- An instrumentation script based on Frida which leverages Control Flow Guard to intercept indirect calls in CFG-enabled Windows binaries.☆30Jun 24, 2015Updated 10 years ago
- A simple tool to help you capture Ioctls.☆20Aug 26, 2017Updated 8 years ago
- ☆15Feb 9, 2018Updated 8 years ago
- ☆18Dec 5, 2016Updated 9 years ago
- Example to execute code in a remote process using wndproc trick☆16Apr 2, 2017Updated 8 years ago
- injects a DLL into a running process or starts a process with DLL being the very first one imported.☆34Sep 29, 2012Updated 13 years ago
- Reverse Engineer ALL The Things (tm)☆53May 17, 2012Updated 13 years ago
- ☆38Jul 7, 2017Updated 8 years ago
- An analytical debugger programmed in C++, using Qt.☆22May 20, 2012Updated 13 years ago
- This project uses the .NET framework to bypass Antivirus solutions.☆29Mar 24, 2013Updated 12 years ago
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago