pstolarz / asprextLinks
ASProtect reverse engineering & analysis WinDbg extension
☆23Updated 4 years ago
Alternatives and similar repositories for asprext
Users that are interested in asprext are comparing it to the libraries listed below
Sorting:
- User-mode part of Zerokit platform☆22Updated 6 years ago
- Use WinDBG to trace the Windows API calls of any Portable Executable file☆31Updated 8 years ago
- An API Monitor based on Instrumentation☆44Updated 7 years ago
- A wrapper for capstone for bearparser☆15Updated 2 years ago
- Analysis and Modification Tool for Executables☆17Updated 6 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 4 years ago
- Simple PE packer with RtlCompressBuffer☆21Updated 10 years ago
- Window Executable file Function tracer using Debugging API☆44Updated 6 years ago
- Miscellaneous old Exploit code and PoCs☆16Updated last year
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 6 years ago
- collection of links related to using and improving windbg☆20Updated 7 years ago
- HadesMem is a C++-based memory hacking library for Windows based applications, with the goal of providing a safe, generic, powerful, and …☆28Updated 10 years ago
- ☆29Updated 10 years ago
- ☆28Updated 9 years ago
- A collection of anti disassembly techniques☆19Updated 8 years ago
- penter hook example and driver time recorder☆31Updated 8 years ago
- My commands and scripts extending WinDbg☆40Updated 6 months ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆35Updated 8 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Updated 8 years ago
- Kernel-mode file scanner☆18Updated 7 years ago
- Just another tool to download specify Symbol (.pdb) files☆38Updated 6 years ago
- Demonstrate the new FileDispositionInfoEx behavior☆14Updated 7 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Updated 7 years ago
- ☆20Updated 6 years ago
- Kernel (Ring0) - SSDT unhook driver☆15Updated 7 years ago
- WhoCalls can query a directory of files, find the binaries, and search for a user specified Win API import. It and works with both 32-bit…☆18Updated 3 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- drvtriks kernel driver for Windows 7 SP1 and 8.1 x64, that tricks around in your system.☆33Updated 8 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago