li4321 / selfmovingdll
☆21Updated 4 months ago
Alternatives and similar repositories for selfmovingdll:
Users that are interested in selfmovingdll are comparing it to the libraries listed below
- Signature finder (from PE-bear)☆36Updated 10 months ago
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆59Updated 2 weeks ago
- A few examples of how to trap virtual memory access on Windows.☆29Updated 3 months ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆27Updated 8 months ago
- Example of building an application verifer DLL☆46Updated 10 months ago
- Header-only C++ library for producing PE files.☆32Updated last year
- Generate a PDB file given the old PDB file and an address mapping☆44Updated last month
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆17Updated 8 months ago
- Easy encrypt/decrypt data with TPM☆25Updated last year
- I/O Cache-As-Ram + AMD x86_64 cache line locking | Mirror of https://codeberg.org/3itch/icekit☆14Updated last month
- ☆41Updated 3 weeks ago
- Finding Truth in the Shadows☆89Updated 2 years ago
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated last year
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆99Updated last year
- ☆25Updated 2 years ago
- Remote Thread Detection with a Kernel Driver☆30Updated 3 months ago
- A native Windows library for intercepting kernel-to-user transitions using instrumentation callbacks☆19Updated last year
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆56Updated this week
- Next gen process injection technique☆52Updated 4 years ago
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆23Updated 9 months ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆33Updated last year
- ☆29Updated last month
- Elevate arbitrary MSR writes to kernel execution.☆33Updated last year
- ☆14Updated last year
- ☆38Updated last month
- Detours implementation (x64/x86) which used only ntdll import☆90Updated 10 months ago
- Reimplementation of the KExecDD DSE bypass technique.☆47Updated 7 months ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆25Updated this week
- Callstack spoofing using a VEH because VEH all the things.☆20Updated 3 weeks ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆10Updated 4 months ago