namjkee / ssdt.Recover.21yu3
绕过卡巴斯基主动防御,加载驱动,unhook所有ssdt hook及shadow ssdt hook
☆36Updated 8 years ago
Related projects: ⓘ
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆49Updated 3 years ago
- 卓然主动防御源码(可执行文件+完整源码+完整作品报告)☆14Updated 5 years ago
- windows 黑客技术编程技术详解配套的代码资源☆14Updated 4 years ago
- ida提取特征码脚本☆53Updated 4 years ago
- shellcode注入测试工具☆49Updated 5 years ago
- 基于UC的启发式杀毒引擎[还没做完]☆30Updated 3 years ago
- Windows CVE主防(HIPS/HIDS)☆53Updated 3 years ago
- 安全卫士r3工具集☆37Updated 4 years ago
- inject dll from kernal mode to user mode process use Apc☆31Updated 4 years ago
- Rapid generation ShellCode☆59Updated 7 years ago
- 一个早期的抗启发式查杀的WIN32免杀壳☆44Updated 11 years ago
- ☆38Updated this week
- Thanks to all those who helped me.☆19Updated 6 years ago
- ☆26Updated 7 years ago
- 大表哥的Syscall-Monitor☆33Updated 5 years ago
- 反射式注入☆24Updated 5 years ago
- 编译时混淆字符串,以确保生成的二进制PE不会暴漏明文字符串。(C++ 14 及以上)☆23Updated 2 years ago
- 感染MBR 下载并运行文件。☆33Updated 2 years ago
- VT Hook☆42Updated 2 months ago
- HTTPS GET RAT and Memory Loader☆24Updated 2 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆62Updated 2 years ago
- map driver to memory☆25Updated 6 years ago
- No inline asm,support x86/x64☆63Updated 3 years ago
- For Example. See Miro's Blog☆29Updated last year
- windows inlinehook R3 R0☆11Updated 6 years ago
- 内存加载DLL 支持X86和X64(Memory PELoader Support X86 and X64)☆29Updated last year
- 具备对PE文件添加区段、添加花指令、对代码段加密、修复重定位、加密IAT等功能☆58Updated 4 years ago
- intel vt-x hypervisor ept☆26Updated 4 years ago
- 小型主动防御引擎☆58Updated 8 years ago
- Changes handle's access rights using DKOM with a vulnerable driver☆24Updated 7 years ago