jschicht / HideAndProtectLinks
Makes files super hidden on NTFS
☆16Updated 10 years ago
Alternatives and similar repositories for HideAndProtect
Users that are interested in HideAndProtect are comparing it to the libraries listed below
Sorting:
- An example pattern in C# for using WMI to monitor process creation and termination events.☆52Updated 6 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- An example of PE hollowing injection technique☆23Updated 6 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Updated 9 years ago
- Simple shellcode injector.☆14Updated 6 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 6 years ago
- CmdDesktopSwitch is a small utility that lists all windows desktops and provides the option to switch between them. This can be used to i…☆35Updated 9 years ago
- ☆33Updated 10 years ago
- A minimal tool to extract shellcode from 64-bit PE binaries.☆50Updated 3 years ago
- DLL Injection Library & Tools☆71Updated 9 years ago
- Sample libraries to be used with IAT Patcher☆34Updated 2 years ago
- Various Crypter Project☆51Updated 11 years ago
- Arya is a simple obfuscator for .NET binaries.☆39Updated 7 years ago
- Archive of ransomware decryptors☆30Updated 7 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 6 years ago
- Evil Reflective DLL Injection Finder☆47Updated 6 years ago
- Discover TimeDateStamps In PE File☆17Updated 9 years ago
- ☆22Updated 4 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- Injection of MSIL using Cecil☆12Updated 9 years ago
- Another Portable Executable files analysing stuff☆21Updated 14 years ago
- A small library helping to parse commandline parameters (for C/C++)☆57Updated last month
- ☆21Updated 9 years ago
- Ammyy v3 Source Code leak , with ❤️ <3☆37Updated 8 years ago
- Ip Transmitter.☆7Updated 9 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Ring3 Rootkit Backdoor.☆41Updated 9 years ago
- ☆13Updated 8 years ago
- Kernel mode windows NT API logger☆22Updated 5 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Updated 9 months ago