jschicht / HideAndProtectLinks
Makes files super hidden on NTFS
☆16Updated 11 years ago
Alternatives and similar repositories for HideAndProtect
Users that are interested in HideAndProtect are comparing it to the libraries listed below
Sorting:
- An example pattern in C# for using WMI to monitor process creation and termination events.☆53Updated 7 years ago
- Sample libraries to be used with IAT Patcher☆36Updated 3 years ago
- An example of PE hollowing injection technique☆25Updated 6 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 11 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Updated last year
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 7 years ago
- A minimal tool to extract shellcode from 64-bit PE binaries.☆51Updated 4 years ago
- A Privacy-Conscious, DNS-over-HTTP-Enabled, Blacklist-Incorporating SOCKS5 Proxy☆30Updated 6 years ago
- CmdDesktopSwitch is a small utility that lists all windows desktops and provides the option to switch between them. This can be used to i…☆35Updated 9 years ago
- Windows Process Lockdown Tool using Job Objects☆70Updated 12 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- DLL Injection Library & Tools☆72Updated 9 years ago
- Ammyy v3 Source Code leak , with ❤️ <3☆40Updated 8 years ago
- Blog posts☆29Updated 5 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Updated 10 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 7 years ago
- ☆33Updated 10 years ago
- Demos and presentation from SECArmy Village Grayhat 2020☆37Updated 2 years ago
- Archive of ransomware decryptors☆33Updated 7 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Updated 7 years ago
- Windows DLL Loading Utility☆12Updated 5 years ago
- 🔵 ethereum grid trading bot☆35Updated last month
- Contains some tricks to detect Sandboxes and gradually completed☆44Updated 8 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Updated 5 years ago
- Code Injector Using Code Caves☆15Updated 10 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆29Updated 7 years ago
- Various Crypter Project☆53Updated 11 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- A DLL that serves OutputDebugString content over a TCP connection☆35Updated 4 years ago