jungjin0003 / ProcessStealthLinks
☆23Updated 4 years ago
Alternatives and similar repositories for ProcessStealth
Users that are interested in ProcessStealth are comparing it to the libraries listed below
Sorting:
- Hides processes from the windows task manager using IAT hooking.☆22Updated 4 years ago
- Process Hollowing demonstration & explanation☆35Updated 4 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆27Updated 4 years ago
- Elevate arbitrary MSR writes to kernel execution.☆44Updated 2 years ago
- Dump system call codes, names, and offsets from Ntdll.dll☆83Updated 2 years ago
- Simple API Hooks detector☆77Updated 3 years ago
- Dynamically generated obfuscated jumps and/or function calls☆38Updated 2 years ago
- PE Header (.rdata,.data,.text) obsfucation☆36Updated 3 years ago
- Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆23Updated 4 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆26Updated 6 years ago
- A manual PE mapping implementation, aka reflective loader☆20Updated 3 years ago
- Scan for potentially vulnerable drivers☆94Updated 3 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Updated 3 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 8 years ago
- Fake Timestamps of Driver Certificates while keeping validity.☆18Updated 4 years ago
- A quick-and-dirty anti-hook library proof of concept.☆105Updated 7 years ago
- Simple x86 Trampoline Hook☆45Updated 3 years ago
- Detours implementation (x64/x86) which used only ntdll import☆90Updated 3 months ago
- Read my blog for more info -☆31Updated 4 years ago
- Мутация PE x86☆16Updated 6 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated 2 years ago
- Software Protector☆19Updated 5 years ago
- ☆59Updated 3 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆74Updated 4 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆21Updated 3 years ago
- what the fuck is this shit☆25Updated 10 years ago
- PoC for hiding processes from Windows Task Manager by manipulating the graphic interface☆47Updated 5 years ago
- Simple website to automatically generate string encryption/decryption routines for C#☆10Updated 3 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆30Updated 4 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Updated 3 years ago