li4321 / selfmovingdllLinks
☆24Updated 6 months ago
Alternatives and similar repositories for selfmovingdll
Users that are interested in selfmovingdll are comparing it to the libraries listed below
Sorting:
- Signature finder (from PE-bear)☆36Updated last month
- Easy encrypt/decrypt data with TPM☆25Updated last year
- A native Windows library for intercepting kernel-to-user transitions using instrumentation callbacks☆20Updated last year
- Mentally ill EtwTi parser☆38Updated 2 months ago
- A few examples of how to trap virtual memory access on Windows.☆30Updated 5 months ago
- Example of building an application verifer DLL☆46Updated last year
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆30Updated 9 months ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆76Updated last month
- ☆19Updated 3 months ago
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆65Updated 2 months ago
- ☆39Updated 3 months ago
- Demo from the Malware Analysis and Development Webinar☆20Updated last year
- ☆46Updated 2 months ago
- ☆20Updated 6 months ago
- ☆30Updated 3 months ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆17Updated 10 months ago
- Elevate arbitrary MSR writes to kernel execution.☆36Updated last year
- Remote Thread Detection with a Kernel Driver☆30Updated 4 months ago
- I/O Cache-As-Ram + AMD x86_64 cache line locking | Mirror of https://codeberg.org/3itch/icekit☆14Updated 2 months ago
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆21Updated last month
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆29Updated 2 years ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆63Updated last month
- Callstack spoofing using a VEH because VEH all the things.☆21Updated 2 months ago
- Header-only C++ library for producing PE files.☆33Updated last year
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated last year
- Repository of Microsoft Driver Block Lists based off of OS-builds☆39Updated last year
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆31Updated 11 months ago
- An example of how to use Microsoft Windows Warbird technology☆28Updated 2 years ago
- SetWinEventHook Sample☆47Updated last year