mentebinaria / filegrabLinks
Capture newly created files on Windows
☆66Updated 4 years ago
Alternatives and similar repositories for filegrab
Users that are interested in filegrab are comparing it to the libraries listed below
Sorting:
- This x64dbg plugin adds several commands for dumping PE header information by address.☆63Updated 8 years ago
- Inject code into a legitimate process☆145Updated 10 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated 3 months ago
- My collection of unpackers for malware packers/crypters☆28Updated 8 years ago
- Plugin to patch and remove ASLR from PE files on x64dbg☆39Updated 3 years ago
- MASM32 Code collection for reverse engineers☆158Updated last month
- A DLL that performs IAT hooking☆27Updated 7 years ago
- Simple windows API logger☆109Updated 6 years ago
- Hidden kernel mode code execution for bypassing modern anti-rootkits.☆85Updated 14 years ago
- APIInfo Plugin (x86) - A Plugin For x64dbg☆50Updated 7 years ago
- Set of antianalysis techniques found in malware☆131Updated 2 years ago
- Full DLL Hooking, phrack 65☆53Updated 2 years ago
- [F]aster [U]niversal [U]npacker☆58Updated 12 years ago
- An Open Source Windows DLL Injector With All Known Techniques Available☆88Updated 7 years ago
- Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used …☆154Updated 2 years ago
- Automatically exported from code.google.com/p/corkami☆58Updated 4 years ago
- A sample on how to inject a DLL from a kernel driver☆62Updated 9 years ago
- ☆23Updated 4 years ago
- Exploits I've authored☆60Updated 6 years ago
- Extract labels from IDA, Ghidra, Binary Ninja, and Relyze files and export x64dbg database. Including radare2 main address.☆113Updated 2 years ago
- Anti-Debugging detection and obufuscation techniques that involved the use of Win32 API functions.☆34Updated 9 years ago
- MSI NTIOLib/WinIO Local Privilege Escalation exploit☆96Updated 9 years ago
- Crackmes Keygenmes Serialmes y más☆42Updated 3 years ago
- Simple tool to check visual studio project files for Exec, PreBuildEvent and PostBuildEvent☆12Updated 5 years ago
- Enumerate user mode shared memory mappings on Windows.☆125Updated 4 years ago
- ShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solution…☆219Updated 3 years ago
- JITM is an automated tool to bypass the JIT Hooking protection on a .NET sample.☆55Updated 4 years ago
- Sample project for kernel debugging automation with Vagrant☆60Updated 5 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆79Updated 10 years ago
- Proof of concept memory anti-forensic toolkit designed for hiding various artifacts inside the memory dump during memory acquisition on M…☆12Updated 6 years ago