li4321 / selfmovingdll
☆23Updated 5 months ago
Alternatives and similar repositories for selfmovingdll:
Users that are interested in selfmovingdll are comparing it to the libraries listed below
- Example of building an application verifer DLL☆46Updated 11 months ago
- Signature finder (from PE-bear)☆36Updated 2 weeks ago
- A native Windows library for intercepting kernel-to-user transitions using instrumentation callbacks☆19Updated last year
- SetWinEventHook Sample☆47Updated last year
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated last year
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆62Updated last month
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆33Updated last year
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆75Updated this week
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆17Updated 9 months ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆28Updated 2 years ago
- Easy encrypt/decrypt data with TPM☆25Updated last year
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Updated last year
- Header-only C++ library for producing PE files.☆32Updated last year
- Elevate arbitrary MSR writes to kernel execution.☆34Updated last year
- I/O Cache-As-Ram + AMD x86_64 cache line locking | Mirror of https://codeberg.org/3itch/icekit☆14Updated last month
- Windows kernel driver template for cmkr and llvm-msvc.☆34Updated last year
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆79Updated 6 months ago
- Remote Thread Detection with a Kernel Driver☆30Updated 3 months ago
- An example of how to use Microsoft Windows Warbird technology☆27Updated 2 years ago
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆34Updated 3 years ago
- Exploit for eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆27Updated last week
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆53Updated 2 years ago
- ☆25Updated 2 years ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆11Updated 5 months ago
- Rule Engine for Dynamic Malware Analysis and Research☆23Updated 2 weeks ago
- ☆45Updated last month
- A few examples of how to trap virtual memory access on Windows.☆30Updated 4 months ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆27Updated 9 months ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆39Updated last year
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆40Updated 5 months ago