kysam / NhoVirtualizerLinks
A simple native code virtualizer for 32-bit Windows PE
☆15Updated 9 years ago
Alternatives and similar repositories for NhoVirtualizer
Users that are interested in NhoVirtualizer are comparing it to the libraries listed below
Sorting:
- ☆23Updated 7 years ago
- Wow64 syscall hook☆40Updated 8 years ago
- windows kernel File redirection☆20Updated 10 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- 💉 Personal project that I inject into games for debugging☆20Updated 8 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago
- A driverless driver that is supposed to be manually mapped, usually by using TDL exploit. The driver shows how to read/write to any proce…☆21Updated 7 years ago
- ☆14Updated 8 years ago
- just an lite AntiRootkit for interesting☆23Updated 9 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago
- You don't need install any wdk for development kernel driver☆24Updated 6 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆17Updated 12 years ago
- PE Infector/Cryptor source code☆15Updated 8 years ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Updated 10 years ago
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Updated 10 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 8 years ago
- Simple PE packer with RtlCompressBuffer☆21Updated 9 years ago
- UI application that can compare PE images in memory or in raw PE file☆17Updated 11 years ago
- PE rebuilder, based on yoda's realigndll☆12Updated 13 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆25Updated 11 years ago
- A library that allows hook any imported function from the IAT (works only in x64)☆11Updated 6 years ago
- ☆19Updated 9 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Updated 7 years ago
- easy detour-, vftable-, iat- and eathooking☆12Updated 9 years ago
- 给windows窗口全局添加一些功能。☆21Updated 6 years ago
- Notes my learning steps about Windows-NT☆23Updated 8 years ago
- Kernel-mode file scanner☆18Updated 6 years ago
- ☆14Updated 8 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago