olliencc / WindowsPatchDetectorLinks
Experimental: Windows .text section compare - disk versus memory
☆15Updated 10 years ago
Alternatives and similar repositories for WindowsPatchDetector
Users that are interested in WindowsPatchDetector are comparing it to the libraries listed below
Sorting:
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- implementation of some concepts in Security and Exploiting☆13Updated 10 years ago
- Experimental Windows .text section Patch Detector☆22Updated 10 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 8 years ago
- Malware analyses and helpful scripts☆29Updated 3 years ago
- ☆34Updated 8 years ago
- ☆23Updated 4 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 7 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 4 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 8 years ago
- Code Injector Using Code Caves☆15Updated 10 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 8 years ago
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 12 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- ☆16Updated 8 years ago
- Sample libraries to be used with IAT Patcher☆36Updated 3 years ago
- ☆43Updated 7 years ago
- Scripts targeting specific families☆13Updated 8 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- WinAppDbg helper script to catch API calls☆12Updated 12 years ago
- CmdDesktopSwitch is a small utility that lists all windows desktops and provides the option to switch between them. This can be used to i…☆35Updated 9 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- reverse engineering, visual binary analysis☆24Updated 8 years ago
- ☆24Updated 6 years ago
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Updated 9 years ago
- Public repository for HEVD exploits☆20Updated 7 years ago