jschicht / HideAndProtect
Makes files super hidden on NTFS
☆15Updated 10 years ago
Alternatives and similar repositories for HideAndProtect:
Users that are interested in HideAndProtect are comparing it to the libraries listed below
- An example pattern in C# for using WMI to monitor process creation and termination events.☆51Updated 6 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 6 years ago
- ☆31Updated 9 years ago
- Library for Windows XML Event Log (EVTX) data types☆17Updated 3 months ago
- Windows DLL Loading Utility☆11Updated 4 years ago
- Windows x64 Process Scanner to detect application compatability shims☆36Updated 6 years ago
- Arya is a simple obfuscator for .NET binaries.☆39Updated 7 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆15Updated 9 years ago
- User-mode hook bypassing method☆33Updated 8 years ago
- ☆16Updated 7 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 6 years ago
- CmdDesktopSwitch is a small utility that lists all windows desktops and provides the option to switch between them. This can be used to i…☆33Updated 8 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- ☆22Updated 3 years ago
- Sample libraries to be used with IAT Patcher☆33Updated 2 years ago
- Blog posts☆30Updated 4 years ago
- Anti-AV compilation☆42Updated 11 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆30Updated 4 years ago
- Injection of MSIL using Cecil☆12Updated 9 years ago
- The evolution of NxRansomware☆10Updated 5 years ago
- Antivirus Emulator Fingerprints☆27Updated 6 years ago
- Powerful commandline $MFT record editor.☆23Updated 9 years ago
- Code injection via delay load libraries☆34Updated 7 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- A DLL that serves OutputDebugString content over a TCP connection☆35Updated 3 years ago
- If you want to exploit some kernel overflows, I've designed (long time ago) several levels ; have fun!☆8Updated 12 years ago
- Memory searching utilities☆42Updated 11 years ago
- Run Managed Assemblies with RunDll☆16Updated 6 years ago