rad9800 / RansomFSLinks
☆31Updated 10 months ago
Alternatives and similar repositories for RansomFS
Users that are interested in RansomFS are comparing it to the libraries listed below
Sorting:
- Rule Engine for Dynamic Malware Analysis and Research☆25Updated 8 months ago
- Intel 64/Windows low-level experiments☆62Updated 4 months ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆80Updated 6 months ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆42Updated last year
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆92Updated 6 months ago
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆126Updated 2 weeks ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- ☆27Updated 2 years ago
- ☆35Updated 2 years ago
- ☆21Updated 10 months ago
- ☆19Updated 3 months ago
- ☆52Updated 9 months ago
- Easy encrypt/decrypt data with TPM☆25Updated last year
- Repository of Microsoft Driver Block Lists based off of OS-builds☆42Updated last year
- Zero-dependency MCP server implementation.☆56Updated last month
- Mentally ill EtwTi parser☆67Updated 2 months ago
- Virtual Trust Level (VTL 1) secure call tracing☆84Updated 4 months ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Updated 2 years ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆68Updated 3 months ago
- the Open Source and Pure C++ Packer for eXecutables☆21Updated 2 years ago
- ☆58Updated 2 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 10 months ago
- ☆31Updated last year
- ☆61Updated 8 months ago
- ☆20Updated 5 years ago
- ☆21Updated 2 years ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆73Updated 8 months ago
- A few examples of how to trap virtual memory access on Windows.☆38Updated last year
- takes shellcode with bad-characters and banishes them, returning cleaned shellcode with preserved functionalities☆52Updated last week
- Microsoft Vulnerable Driver Block Lists in CSV and JSON for SIEM lookups☆53Updated 3 months ago