olliencc / WindowsPatchDetector
Experimental: Windows .text section compare - disk versus memory
☆14Updated 10 years ago
Alternatives and similar repositories for WindowsPatchDetector:
Users that are interested in WindowsPatchDetector are comparing it to the libraries listed below
- Experimental Windows .text section Patch Detector☆21Updated 10 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 6 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 7 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 6 years ago
- Exception detector for windows programs(x86 only)☆11Updated 8 years ago
- ☆10Updated 7 years ago
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago
- ☆22Updated 4 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆10Updated 8 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 4 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- ☆24Updated 5 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- My manual analysis of malware families☆13Updated 7 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 7 years ago
- Simple shellcode injector.☆14Updated 6 years ago
- ☆33Updated 7 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- ☆11Updated 4 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 6 years ago
- Malware analyses and helpful scripts☆29Updated 2 years ago
- If you want to exploit some kernel overflows, I've designed (long time ago) several levels ; have fun!☆8Updated 13 years ago
- ☆10Updated 7 years ago
- implementation of some concepts in Security and Exploiting☆13Updated 9 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- Universal Malware Sample Encryption☆11Updated last year
- ☆12Updated 7 years ago
- My conference presentations and publications☆26Updated 3 years ago