lfontesm / PEB-Walk
☆12Updated 3 years ago
Alternatives and similar repositories for PEB-Walk:
Users that are interested in PEB-Walk are comparing it to the libraries listed below
- An automatic tool for fixing dumped PE files☆41Updated 4 years ago
- ☆31Updated 2 years ago
- Go Lang Portable Executable Parser☆39Updated 3 years ago
- Write-ups for FireEye's FLARE-On challenges☆25Updated 5 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 3 years ago
- PoC for hiding PE exports☆66Updated 4 years ago
- ☆66Updated last year
- UnpacMe IDA Byte Search☆27Updated last year
- Clone running process with ZwCreateProcess☆58Updated 4 years ago
- TrashDBG the world's worse debugger☆23Updated 2 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆96Updated 4 years ago
- This is a simple driver with x64 inline assembly☆54Updated 4 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆50Updated 4 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆53Updated 5 years ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆31Updated 5 years ago
- Set of antianalysis techniques found in malware☆129Updated last year
- API Logger for Windows Executables☆78Updated 4 years ago
- Parsers for custom malware formats ("Funky malware formats")☆92Updated 3 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆34Updated 3 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- Process Hollowing Detection on a live system☆13Updated 7 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆33Updated last year
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆88Updated 3 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆68Updated 2 years ago
- 2022 Updated Kernelmode-Code☆31Updated 10 months ago
- ☆18Updated 3 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 2 years ago
- Process Hollowing for 32 bit and 64 bit☆80Updated 7 years ago
- Resolve DOS MZ executable symbols at runtime☆96Updated 3 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆73Updated 3 years ago