Live hunting of code injection techniques
☆386Aug 22, 2019Updated 6 years ago
Alternatives and similar repositories for memhunter
Users that are interested in memhunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SysmonX - An Augmented Drop-In Replacement of Sysmon☆219Sep 17, 2019Updated 6 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Oct 16, 2019Updated 6 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆110Apr 24, 2020Updated 5 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆827Mar 10, 2022Updated 4 years ago
- Enumerate and disable common sources of telemetry used by AV/EDR.☆847Mar 11, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,611Updated this week
- Userland API monitor for threat hunting☆58Mar 4, 2020Updated 6 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- a program to detect reflective dll injection on a live machine☆76Dec 12, 2015Updated 10 years ago
- Hide codes/data in the kernel address space.☆187May 8, 2021Updated 4 years ago
- Obfuscate specific windows apis with different apis☆1,020Feb 21, 2021Updated 5 years ago
- Phantom DLL hollowing PoC☆372May 23, 2022Updated 3 years ago
- AV/EDR evasion via direct system calls.☆2,003Jan 1, 2023Updated 3 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆146Feb 23, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆39Oct 29, 2020Updated 5 years ago
- ☆308May 6, 2021Updated 4 years ago
- ☆829Dec 28, 2019Updated 6 years ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,338Updated this week
- Kernel Pool Monitor☆128Mar 6, 2022Updated 4 years ago
- A more stealthy variant of "DLL hollowing"☆366Mar 8, 2024Updated 2 years ago
- The Win32 Anti-Intrusion Library☆214May 30, 2019Updated 6 years ago
- Adds a user-mode asynchronous procedure call (APC) object to the APC queue of the specified thread and spoof the Parent Process.☆157Jun 10, 2019Updated 6 years ago
- Executes 64bit code from a 32bit process☆240Jul 23, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆37May 9, 2019Updated 6 years ago
- Adaptive DLL hijacking / dynamic export forwarding☆812Jul 6, 2020Updated 5 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆227Jun 9, 2020Updated 5 years ago
- A way to delete a locked file, or current running executable, on disk.☆619Nov 5, 2025Updated 5 months ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,277May 1, 2024Updated last year
- PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware.☆431May 22, 2020Updated 5 years ago
- ☆831Jun 1, 2023Updated 2 years ago
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆149Sep 16, 2020Updated 5 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,511Nov 15, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ETWProcessMon2 is for Monitoring Process/Thread/Memory/Imageloads/TCPIP via ETW + Detection for Remote-Thread-Injection & Payload Detecti…☆321Mar 20, 2024Updated 2 years ago
- Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windo…☆230Mar 18, 2024Updated 2 years ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆581Mar 8, 2024Updated 2 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆105May 14, 2020Updated 5 years ago
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆232Jul 26, 2020Updated 5 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆920Aug 19, 2021Updated 4 years ago
- Events from all manifest-based and mof-based ETW providers across Windows 10 versions☆332May 2, 2024Updated last year