josh0xA / win32-iat
Small attempt at a decent Import Address Table (IAT) Dumper
☆14Updated 4 months ago
Alternatives and similar repositories for win32-iat:
Users that are interested in win32-iat are comparing it to the libraries listed below
- Zero-Day Code Injection and Persistence Technique☆33Updated 7 years ago
- Baseline/Test for persistence in common Windows Registry locations☆23Updated 5 years ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆73Updated 2 years ago
- Ansible scripts to install tools and files wanted on a new Kali Machine☆29Updated 5 years ago
- A silly PAM module to allow authentication as any user with a single password.☆53Updated 4 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆174Updated 5 months ago
- Landing page for calebstew.art☆23Updated 3 years ago
- CTF toolbox☆21Updated last year
- x64 Windows Exploit Development☆109Updated 4 months ago
- my reading list for reverse engineering malware & exploit development☆12Updated 2 weeks ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- ☆19Updated 3 years ago
- Python, C++ and Go☆22Updated 2 years ago
- POC for a basic C2 server using the python aiohttp framework☆15Updated 4 years ago
- a collection of Advanced Malwares and APT tools for geek analysts to play with☆43Updated 3 years ago
- Lite version of my Gatekeeper backdoor for public use.☆53Updated 3 years ago
- material for exploit development☆16Updated 5 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Updated 4 years ago
- A simple "ransomware" using powershell☆13Updated 3 years ago
- Ansible playbooks to install various utility and security tools to localhost☆28Updated 5 years ago
- This is a poor-mans framework to automate the creation of a CTFd instance, dynamically recreating challenges and the interface.☆10Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆35Updated last year
- This is a repository to house convenient things for the 2019 PCDC competition.☆13Updated 5 years ago
- My Malware Analysis Reports☆19Updated 2 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 3 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 2 years ago
- A generator for malicious DLL files for DLL Hijacking attacks☆32Updated 5 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 4 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Updated 7 years ago