nnnewb / learning-packerLinks
学习加壳技术的案例代码
☆24Updated 3 years ago
Alternatives and similar repositories for learning-packer
Users that are interested in learning-packer are comparing it to the libraries listed below
Sorting:
- 编译时混淆字符串,以确保生成的二进制PE不会暴漏明文字符串。(C++ 14 及以上)☆28Updated 3 years ago
- 保护进程☆23Updated 2 years ago
- sc4cpp is a shellcode framework based on C++☆90Updated 4 years ago
- 《Windows内核编程》学习☆62Updated 4 years ago
- 内存加载DLL 支持X86和X64(Memory PELoader Support X86 and X64)☆36Updated 2 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆71Updated 3 years ago
- myLittleBear☆58Updated 2 months ago
- windwos内核研究与驱动Code☆66Updated 3 years ago
- 通过重造轮子和调用OpenSSL的方式学习密码!!☆15Updated 2 years ago
- IDA高级技巧 API符号自动识别库 IDASignMaker☆137Updated 4 years ago
- 基于UC的启发式杀毒引擎[还没做完]☆35Updated 4 years ago
- ☆18Updated 3 years ago
- Mhy Exp (exploit signed driver)☆142Updated 3 years ago
- 过TP驱动☆29Updated 5 years ago
- 利用物理内存映射,实现虚拟内存的伪隐藏☆84Updated 3 years ago
- 基于sunday算法的内存快速搜索,搜索2GB内存只需1秒☆73Updated 5 years ago
- PE加壳程序☆81Updated 6 years ago
- ida提取特征码脚本☆56Updated 5 years ago
- ☆25Updated 3 years ago
- 大数字驱动逆向代码☆74Updated last year
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆51Updated 4 years ago
- 学习windows驱动相关☆23Updated 6 years ago
- Win7内核私有符号结构转储☆70Updated 4 years ago
- Windows CVE主防(HIPS/HIDS)☆56Updated 4 years ago
- windows rpc 使用MIDL+RPC实现HelloWorld☆23Updated 7 years ago
- Call NtCreateUserProcess directly as normal.☆74Updated 3 years ago
- 卓然主动防御源码(可执行文件+完整源码+完整作品报告)☆15Updated 6 years ago
- 以shellcode注入其它驱动执行,躲避驱动签名检测,曾pubg项目中使用,,,当然现在,,,☆26Updated 2 years ago
- 绕过卡巴斯基主动防御,加载驱动,unhook所有ssdt hook及shadow ssdt hook☆38Updated 9 years ago
- 驱动加载器 -> 利用iqvw64e.sys映射驱动☆57Updated 5 years ago