psmitty7373 / eifLinks
Evil Reflective DLL Injection Finder
☆47Updated 6 years ago
Alternatives and similar repositories for eif
Users that are interested in eif are comparing it to the libraries listed below
Sorting:
- a program to detect reflective dll injection on a live machine☆74Updated 9 years ago
- DLL Injection Library & Tools☆71Updated 9 years ago
- CAPE monitor DLLs☆41Updated 5 years ago
- Shim database persistence (Fin7 TTP)☆37Updated 5 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- A proof-of-concept subject interface package (SIP) used to demonstrate digital signature subversion attacks.☆99Updated 7 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆75Updated 10 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 4 years ago
- Reflective Polymorphism☆104Updated 7 years ago
- Enumerate Windows Defender threat families and dump their names according category☆90Updated 6 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆96Updated 4 years ago
- Archive of ransomware decryptors☆30Updated 7 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆38Updated 9 years ago
- Build a Jekyll blog in minutes, without touching the command line.☆16Updated 6 years ago
- Psinfo is a Volatility plugin which collects the process related information from the VAD (Virtual Address Descriptor) and PEB (Process E…☆36Updated 8 years ago
- Carve files for MFT entries (eg. blkls output or memory dumps). Recovers filenames (long & short), timestamps ($STD & $FN) and data if re…☆21Updated 6 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆44Updated 7 years ago
- ☆21Updated 9 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- Sample libraries to be used with IAT Patcher☆34Updated 2 years ago
- Windows DKOM : Hide Processus☆20Updated 13 years ago
- Code that can be used as a reference, library, or inspiration for hacking Windows memory.☆51Updated 5 years ago
- A slightly stripped down version of RID (an exercise in learning python C-Types...some of it is a little rushed/sloppy) and a stripped do…☆51Updated 12 years ago
- ☆45Updated 7 years ago
- POSHSPY backdoor code☆43Updated 8 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- ☆52Updated 8 years ago
- Alina POS Source Code + Rootkit☆23Updated 9 years ago
- A collection of tools to enumerate and analyse Windows DACLs☆108Updated 10 years ago
- Blog posts☆30Updated 4 years ago