mrexodia / IATFakerLinks
Small project to generate fake DLLs based on an executable's import table
โ24Updated 5 years ago
Alternatives and similar repositories for IATFaker
Users that are interested in IATFaker are comparing it to the libraries listed below
Sorting:
- ๐งถ The Win32 usermode threading library with UMS/fibers/threads supportโ30Updated 6 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)โ43Updated 7 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an objectโ50Updated 4 years ago
- x64 assembler libraryโ31Updated last year
- โ46Updated 6 years ago
- Binary DisASseMblerโ24Updated 3 years ago
- Debug Print viewer (user and kernel)โ68Updated last year
- X86/X64 Hardware Breakpoint Managerโ42Updated 4 years ago
- The updated PE file manipulation library from RetDec project.โ21Updated last year
- โ26Updated 2 years ago
- Example of hijacking system calls via function pointer tablesโ31Updated 4 years ago
- โ37Updated 4 years ago
- A Windows API hooking library !โ32Updated 3 years ago
- Analysing and defeating PatchGuard universallyโ35Updated 4 years ago
- Fix VMProtect 3.xx (tested 3.0.9 to 3.5.0)โ17Updated 3 years ago
- A way to detect DBI frameworks, Debuggers and VMs.โ22Updated 4 years ago
- โ30Updated 3 years ago
- A class to gather information about a process, its threads and modules.โ23Updated 5 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3โ96Updated 3 years ago
- Translates WinDbg "dt" structure dump to a C structureโ13Updated 5 years ago
- devirtualization vmprotectโ62Updated 2 years ago
- Windows driver template, using C++20 & cmake & GithubActionsโ22Updated last year
- Remote memory library in C++17.โ33Updated 7 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weaknessโ53Updated 6 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.โ23Updated 8 years ago
- Elevate arbitrary MSR writes to kernel execution.โ38Updated 2 years ago
- โ31Updated 3 years ago
- โ46Updated 3 years ago
- win32/x64 obfuscate frameworkโ33Updated 6 years ago
- .lib file for linking against the NT CRTโ19Updated 3 years ago