oxiKKK / iat-dump
A dumper for all the imports stored within a Windows PE (portable executable).
☆12Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for iat-dump
- Old way for blocking NMI interrupts☆25Updated 2 years ago
- fecurity executor from factory☆33Updated 2 years ago
- ☆13Updated 3 years ago
- UM-KM Communication using registry callbacks☆39Updated 4 years ago
- ☆18Updated 2 years ago
- ☆41Updated 3 years ago
- ☆44Updated 2 years ago
- ☆41Updated last year
- communicate with kernel using a image on disk☆16Updated 6 months ago
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- clearing traces of a loaded driver☆44Updated 2 years ago
- mouseclassservicecallback detection via hook☆48Updated 2 years ago
- Mapping your code on a 0x1000 size page☆69Updated 2 years ago
- Execute anything in a legit memory region by attacking a windows driver☆20Updated last year
- ☆17Updated 2 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Updated 3 years ago
- C/C++ example of InjectMouseInput function☆31Updated 3 years ago
- Achieving code execution through abusing vectored exception handling☆17Updated last year
- ☆32Updated 2 years ago
- A poc that abuses Enclave☆36Updated 2 years ago
- Stealing signatures from pe files☆15Updated 2 years ago
- ☆49Updated 2 years ago
- simple driver to read and write☆16Updated 4 years ago
- IDA scripts for hypervisor (Hyper-v) analysis and reverse engineering automation☆25Updated 2 years ago