lfontesm / PEB-Walk
☆12Updated 3 years ago
Alternatives and similar repositories for PEB-Walk
Users that are interested in PEB-Walk are comparing it to the libraries listed below
Sorting:
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 3 years ago
- An automatic tool for fixing dumped PE files☆41Updated 4 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 3 years ago
- PoC for hiding PE exports☆66Updated 4 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆88Updated 3 years ago
- MalUnpack companion driver☆98Updated 10 months ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆31Updated 5 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆70Updated 3 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- ☆31Updated 3 years ago
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- Clone running process with ZwCreateProcess☆57Updated 4 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆51Updated 4 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆57Updated 5 years ago
- Windows API Hashes used in the malwares☆40Updated 9 years ago
- Sample project for kernel debugging automation with Vagrant☆59Updated 5 years ago
- ☆18Updated 4 years ago
- ☆71Updated last year
- ☆22Updated 4 years ago
- Set of antianalysis techniques found in malware☆132Updated last year
- Process Injection without R/W target memory and without creating a remote thread☆18Updated 3 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆111Updated 4 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆35Updated 3 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆106Updated 5 years ago
- ☆19Updated last week
- ☆159Updated 3 years ago
- Writeups for CTF challenges☆31Updated last year
- Resolve DOS MZ executable symbols at runtime☆95Updated 3 years ago
- Write-ups for FireEye's FLARE-On challenges☆25Updated 5 years ago