jschicht / HideAndProtectLinks
Makes files super hidden on NTFS
ā16Updated 11 years ago
Alternatives and similar repositories for HideAndProtect
Users that are interested in HideAndProtect are comparing it to the libraries listed below
Sorting:
- Sample libraries to be used with IAT Patcherā36Updated 3 years ago
- šµ ethereum grid trading botā35Updated 2 months ago
- DLL Injection Library & Toolsā73Updated 9 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilationā25Updated 7 years ago
- An example pattern in C# for using WMI to monitor process creation and termination events.ā53Updated 7 years ago
- My collection of unpackers for malware packers/cryptersā28Updated 8 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.ā22Updated 7 years ago
- ā33Updated 10 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systemsā28Updated 7 years ago
- Powerful commandline $MFT record editor.ā25Updated 10 years ago
- ā23Updated 4 years ago
- A minimal tool to extract shellcode from 64-bit PE binaries.ā51Updated 4 years ago
- CmdDesktopSwitch is a small utility that lists all windows desktops and provides the option to switch between them. This can be used to iā¦ā35Updated 9 years ago
- Windows DLL Loading Utilityā12Updated 5 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detectionā32Updated 5 years ago
- A Privacy-Conscious, DNS-over-HTTP-Enabled, Blacklist-Incorporating SOCKS5 Proxyā30Updated 6 years ago
- Windows Process Lockdown Tool using Job Objectsā70Updated 12 years ago
- Archive of ransomware decryptorsā33Updated 8 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit ā¦ā46Updated 7 years ago
- Experimental: Windows .text section compare - disk versus memoryā15Updated 10 years ago
- A Catalog of Application Whitelisting Bypass Techniquesā31Updated 11 years ago
- ā23Updated 9 years ago
- Library for Windows XML Event Log (EVTX) data typesā18Updated 2 weeks ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.ā32Updated 7 years ago
- Ring3 Rootkit Backdoor.ā43Updated 10 years ago
- Demos and presentation from SECArmy Village Grayhat 2020ā37Updated 2 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systemsā29Updated 7 years ago
- Ammyy v3 Source Code leak , with ā¤ļø <3ā40Updated 8 years ago
- Windows x64 Process Scanner to detect application compatability shimsā37Updated 7 years ago
- Making shellcode UD - https://osandamalith.comā25Updated 9 years ago