perceptionpoint / suprotect
Changing memory protection in an arbitrary process
☆47Updated 6 years ago
Alternatives and similar repositories for suprotect
Users that are interested in suprotect are comparing it to the libraries listed below
Sorting:
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Updated 11 years ago
- PoC for CVE-2017-0075☆37Updated 5 years ago
- Breaking Secure Boot with SMM☆40Updated 3 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆116Updated 8 years ago
- My notes about Genyatyk VM crackme☆26Updated 4 years ago
- Bootkits☆19Updated last year
- ☆33Updated 2 years ago
- Tools released in CSS 2019☆38Updated 5 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- ☆49Updated 7 years ago
- My conference presentations and publications☆26Updated 3 years ago
- For code snippets and information☆41Updated 6 years ago
- python library for dumping a linux process from memory☆34Updated 14 years ago
- ☆31Updated 7 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 8 years ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆29Updated 4 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Updated 7 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆94Updated 3 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆43Updated last year
- IDA SIG files for multiarch uClibc library☆37Updated 6 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆29Updated 4 years ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆10Updated 8 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆42Updated 5 years ago
- ☆14Updated 2 years ago