oxiKKK / iat-dump
A dumper for all the imports stored within a Windows PE (portable executable).
☆12Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for iat-dump
- ☆18Updated 2 years ago
- UM-KM Communication using registry callbacks☆39Updated 4 years ago
- fecurity executor from factory☆33Updated 2 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Updated 3 years ago
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- ☆14Updated 3 years ago
- ☆41Updated 3 years ago
- Old way for blocking NMI interrupts☆25Updated 2 years ago
- clearing traces of a loaded driver☆44Updated 2 years ago
- Achieving code execution through abusing vectored exception handling☆16Updated last year
- mouseclassservicecallback detection via hook☆48Updated 2 years ago
- Execute anything in a legit memory region by attacking a windows driver☆20Updated last year
- ☆48Updated 2 years ago
- Mapping your code on a 0x1000 size page☆69Updated 2 years ago
- ☆41Updated last year
- just proof of concept. hooking MmCopyMemory PG safe.☆62Updated 11 months ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆27Updated 2 years ago
- page table manipulation to gain physical r/w☆38Updated 6 months ago
- ☆28Updated last year
- ☆17Updated 2 years ago
- ☆44Updated 2 years ago
- ☆12Updated 3 years ago