mez-0 / YaraEngine
A C++ Yara Rule Runner
☆11Updated 3 years ago
Alternatives and similar repositories for YaraEngine
Users that are interested in YaraEngine are comparing it to the libraries listed below
Sorting:
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆17Updated 9 months ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- Simple and sane compression wrapper library.☆18Updated 2 years ago
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- Repo containing my public talks☆23Updated last year
- ☆21Updated 3 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆31Updated 3 years ago
- Antivirus killer using ring-0 kernel driver. Antivirus processes will automatically close while the killer is running.☆6Updated 2 years ago
- Manually perform syscalls without going through any external API or DLL.☆18Updated 2 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆16Updated 10 months ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- the Open Source and Pure C++ Packer for eXecutables☆20Updated 2 years ago
- ☆39Updated 4 years ago
- ☆15Updated 4 years ago
- Unpacker for donut shellcode☆17Updated 4 years ago
- Specialized tool to dump Position Independent Code.☆22Updated 4 years ago
- x64 Registration-Free In-Process COM Automation Server.☆48Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆62Updated 3 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆40Updated 4 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆31Updated 10 months ago
- Windows process injection methods☆16Updated 5 years ago
- ☆24Updated last year
- ☆28Updated 3 years ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆31Updated 5 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆14Updated last year