jschicht / HideAndProtect
Makes files super hidden on NTFS
☆15Updated 10 years ago
Alternatives and similar repositories for HideAndProtect:
Users that are interested in HideAndProtect are comparing it to the libraries listed below
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 6 years ago
- Windows DLL Loading Utility☆11Updated 4 years ago
- ☆31Updated 9 years ago
- Arya is a simple obfuscator for .NET binaries.☆39Updated 7 years ago
- Experimental: Windows .text section compare - disk versus memory☆14Updated 10 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Updated 9 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆16Updated 6 years ago
- ☆12Updated 8 years ago
- Library for Windows XML Event Log (EVTX) data types☆17Updated 4 months ago
- ☆16Updated 7 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Sample libraries to be used with IAT Patcher☆33Updated 2 years ago
- it's a simple LKM rootkit.☆12Updated 8 years ago
- ☆23Updated 9 years ago
- Anti-AV compilation☆42Updated 11 years ago
- Another Portable Executable files analysing stuff☆20Updated 13 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 7 years ago
- Code Injector Using Code Caves☆14Updated 9 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19Updated 4 years ago
- My manual analysis of malware families☆13Updated 7 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- Shellcode injection using debugging APIs☆19Updated 11 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 6 years ago
- If you want to exploit some kernel overflows, I've designed (long time ago) several levels ; have fun!☆8Updated 12 years ago
- Run Managed Assemblies with RunDll☆17Updated 6 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆27Updated 10 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆26Updated 8 years ago
- Capture Webcam Reflective Dll☆8Updated 8 years ago