likekabin / ForensicsTools_KasperskyLinks
☆10Updated 6 years ago
Alternatives and similar repositories for ForensicsTools_Kaspersky
Users that are interested in ForensicsTools_Kaspersky are comparing it to the libraries listed below
Sorting:
- NT AUTHORITY\SYSTEM☆38Updated 5 years ago
- Tools for analyzing Windows containers and break container's isolation☆32Updated 2 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆14Updated 4 years ago
- Using Thread Description To Hide Shellcodes☆14Updated 2 years ago
- ☆18Updated 6 years ago
- A collection of tools for debugging Windows application crashes.☆15Updated 2 years ago
- ☆28Updated 8 months ago
- Code Integrity Violation Spotter☆16Updated last year
- An Assembly x86 code that shows Windows MessageBox kept as simple as possible.☆11Updated 2 years ago
- Implementation of ITaskHandler in C++☆13Updated 2 years ago
- ☆15Updated last year
- A Practical example of ELAM (Early Launch Anti-Malware)☆34Updated 3 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Updated 4 years ago
- ☆20Updated last month
- ☆25Updated 2 years ago
- Slides from various conference talks☆37Updated 2 years ago
- d☆13Updated last year
- Resources from my journey into Windows binary exploitation☆23Updated 6 years ago
- Subtract one PE file from another!☆22Updated 3 years ago
- ☆31Updated 4 years ago
- ☆12Updated 5 years ago
- WinREPL is a "read-eval-print loop" shell on Windows that is useful for testing/learning x86 and x64 assembly.☆17Updated 2 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Updated last year
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- Yet another Windows DLL injector.☆39Updated 3 years ago
- Another Portable Executable files analysing stuff☆21Updated 14 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆40Updated 4 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Updated 4 years ago
- Manually perform syscalls without going through any external API or DLL.☆19Updated 2 years ago
- ☆19Updated 4 months ago