rad9800 / RansomFS
☆29Updated 2 months ago
Alternatives and similar repositories for RansomFS:
Users that are interested in RansomFS are comparing it to the libraries listed below
- ☆45Updated last month
- ☆30Updated 5 months ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆39Updated last year
- Rule Engine for Dynamic Malware Analysis and Research☆23Updated 2 weeks ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆75Updated this week
- A few examples of how to trap virtual memory access on Windows.☆30Updated 4 months ago
- ☆54Updated last week
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- In-memory hiding technique☆50Updated 4 months ago
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆62Updated last month
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- Callstack spoofing using a VEH because VEH all the things.☆21Updated last month
- Mentally ill EtwTi parser☆36Updated last month
- Code samples that serve as references for Windows API functions☆31Updated 11 months ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆62Updated 3 weeks ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆50Updated last year
- ☆29Updated last year
- the Open Source and Pure C++ Packer for eXecutables☆20Updated 2 years ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆31Updated 10 months ago
- example using NtCreateUserProcess in rust☆19Updated 3 months ago
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- ☆24Updated last year
- List the ETW provider(s) in the registration table of a process.☆59Updated last year
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆36Updated 2 months ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆27Updated 9 months ago
- ☆38Updated 2 months ago
- use python on windows with full submodule support without installation☆27Updated 3 months ago
- Easy encrypt/decrypt data with TPM☆25Updated last year
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆39Updated 6 months ago
- ☆26Updated 2 months ago