psbazx / PE_shell
简单的二进制加密壳
☆11Updated 4 years ago
Alternatives and similar repositories for PE_shell:
Users that are interested in PE_shell are comparing it to the libraries listed below
- A poc of embedding x64 code into x86 PE file☆17Updated 5 years ago
- For Example. See Miro's Blog☆30Updated 2 years ago
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆51Updated 4 years ago
- windows rpc 使用MIDL+RPC实现HelloWorld☆23Updated 7 years ago
- win32kbase!NtDCompositionCommitSynchronizationObject and win32kbase!NtGdiGetCertificate☆16Updated 3 years ago
- 收集常用windows版本内核文件☆32Updated last year
- sc4cpp is a shellcode framework based on C++☆88Updated 3 years ago
- HTTPS GET RAT and Memory Loader☆25Updated 2 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆75Updated 3 years ago
- 沙箱测试,测评国内常见沙箱的代码与结论☆100Updated 3 years ago
- 绕过卡巴斯基主动防御,加载驱动,unhook所有ssdt hook及shadow ssdt hook☆37Updated 9 years ago
- Intel Virtualization Technology demo☆65Updated 8 years ago
- VT Hook☆46Updated 9 months ago
- https://key08.com/index.php/2021/10/19/1375.html☆66Updated 2 years ago
- Win7内核私有符号结构转储☆68Updated 3 years ago
- ☆18Updated 2 years ago
- ☆21Updated 5 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆105Updated 2 years ago
- From 32-bit process to 64-bit process☆70Updated 3 years ago
- 远程注入无导入函数dll,自动重定位以后内存加载dll☆45Updated 5 years ago
- 利用物理内存映射,实现虚拟内存的伪隐藏☆84Updated 2 years ago
- ☆23Updated 2 years ago
- Windows CVE主防(HIPS/HIDS)☆54Updated 3 years ago
- ida提取特征码脚本☆55Updated 5 years ago
- Hook system calls, context switches, page faults and more.☆34Updated 5 years ago
- Automatically exported from code.google.com/p/wskudp☆43Updated 9 years ago
- 大数字驱动逆向代码☆71Updated last year
- inject dll from kernal mode to user mode process use Apc☆32Updated 5 years ago
- Kill Protected Process Light Process (include av)☆56Updated last year
- 反射式注入☆28Updated 5 years ago