Proof of Concept - Hooking API calls of a Ransomware
☆28Apr 7, 2021Updated 5 years ago
Alternatives and similar repositories for Shady-Hook
Users that are interested in Shady-Hook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Win32 API Hook偵測☆10Oct 1, 2017Updated 8 years ago
- A detours library for API hooking in C#☆33Jun 20, 2012Updated 13 years ago
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- xx不限速下载软件备份☆37Apr 16, 2019Updated 7 years ago
- Visually analyze basic block code coverage in Binary Ninja using Pin output.☆12Oct 6, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 9 months ago
- Examples of basic windows API hooking techniques☆20Aug 31, 2020Updated 5 years ago
- Ghidra RE scripts☆38Feb 5, 2021Updated 5 years ago
- easy detour-, vftable-, iat- and eathooking☆12Mar 30, 2016Updated 10 years ago
- 这是一个基于FFmpeg使用 C# 、C++ 开发的最简单的屏幕录制软件。☆50Sep 21, 2019Updated 6 years ago
- Malware Configuration Extraction Modules☆51Nov 25, 2023Updated 2 years ago
- A light-weight network monitor for Windows☆56Nov 28, 2016Updated 9 years ago
- Packet library for Minecraft Beta 1.6.6 -> Release 1.4.1☆13Feb 10, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Jun 30, 2023Updated 2 years ago
- ☆10Aug 11, 2025Updated 8 months ago
- Module for decompressing aPLib compressed data☆17Aug 25, 2022Updated 3 years ago
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- HoneyPot Orchestration☆11Aug 3, 2023Updated 2 years ago
- Emulation Wrapper Solution is a IDA Pro plugin that brings emulator capacities to provide features such as debugging an mocking.☆23May 25, 2023Updated 2 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- ☆10Jun 25, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A simple WireGuard systray applet for the Cinnamon desktop environment.☆15May 3, 2021Updated 4 years ago
- Reads XRM-MS files☆17Aug 31, 2015Updated 10 years ago
- Handy scripts to speed up malware analysis☆34Oct 3, 2023Updated 2 years ago
- Try harder to bypass that WAF...☆14Jan 4, 2015Updated 11 years ago
- Specialized tool to dump Position Independent Code.☆22Aug 4, 2020Updated 5 years ago
- Ghidra Loader Module for C64 programs☆25Mar 29, 2026Updated 3 weeks ago
- ☆12Oct 21, 2020Updated 5 years ago
- Digital Forensics with Kali Linux, Second Edition, Published by Packt☆13Jan 21, 2021Updated 5 years ago
- Read / Write pretty much _any_ memory location (RAM or H/W IO Memory) on a device☆27Oct 13, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆27Oct 22, 2020Updated 5 years ago
- A ImHex plugin to ask the almighty Oracle (OpenAI's Davinci AI) for help identifying file formats☆19Dec 4, 2022Updated 3 years ago
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- ☆18Jul 27, 2017Updated 8 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 9 years ago
- Simple high-interactive client honeypot☆25Oct 15, 2017Updated 8 years ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Jun 2, 2022Updated 3 years ago