break link between dll and it file on disk
☆12Sep 2, 2024Updated last year
Alternatives and similar repositories for remap
Users that are interested in remap are comparing it to the libraries listed below
Sorting:
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 4 months ago
- Minimal header-only C++11 argument parser library for simple command line tools.☆25Feb 2, 2025Updated last year
- really ?☆12Feb 29, 2024Updated 2 years ago
- The Binary Code Recognition Library for game hacking/modding and function reidentification for linux☆13Jan 25, 2026Updated last month
- ☆58Feb 19, 2026Updated last week
- Source data & analysis of NSA SECONDDATE packet-injection framework☆11Apr 9, 2017Updated 8 years ago
- IDA Taskr is a pure Python library for IDA Pro related parallel computing. It lets you use the power of Qt (built-in to IDA!) and Python'…☆29Feb 3, 2026Updated last month
- Set of scripts for performance investigations on Windows.☆31Dec 17, 2025Updated 2 months ago
- Rust crate to obfuscate strings and byte arrays so they are not in memory when not in use.☆19Dec 23, 2025Updated 2 months ago
- Windows Active DIrectory Pentesting documentation.☆19Jun 14, 2024Updated last year
- WFP驱动,关联链路层和进程信息☆16Oct 17, 2021Updated 4 years ago
- Windows kernel driver that detects hypervisors by probing SIDT/LIDT edge cases, paging/TLB behaviors, privilege transitions, and timing e…☆36Dec 17, 2025Updated 2 months ago
- Self delete DLL (2)☆14Feb 15, 2024Updated 2 years ago
- Collect CPU callstack samples from a windows process☆51Feb 20, 2026Updated last week
- Admin to Kernel code execution using the KSecDD driver☆265Apr 19, 2024Updated last year
- ☆26Mar 6, 2025Updated 11 months ago
- Explore Job Objects on a Windows system☆82Sep 4, 2019Updated 6 years ago
- An example of how to use Microsoft Windows Warbird technology☆96Apr 23, 2023Updated 2 years ago
- Make an Linux Kernel rootkit visible again.☆59Feb 27, 2025Updated last year
- PCILeech HP iLO4 Service☆24Jan 9, 2019Updated 7 years ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆96Apr 3, 2025Updated 11 months ago
- ☆108Aug 21, 2024Updated last year
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆19Jan 3, 2023Updated 3 years ago
- ☆21Feb 22, 2025Updated last year
- A set of programs for analyzing common vulnerabilities in COM☆248Sep 8, 2024Updated last year
- A tool to get symbols from executables to help with Windhawk mod development☆27May 3, 2025Updated 10 months ago
- silence file system monitoring components by hooking their minifilters☆60Jan 31, 2024Updated 2 years ago
- Cargo subcommand to build a crate into shellcode☆27Aug 15, 2024Updated last year
- anti-ransomware file-system filter☆69Sep 3, 2024Updated last year
- Public issue and feedback tracking for WinDbg Preview.☆58May 15, 2025Updated 9 months ago
- shell code example☆68Dec 12, 2025Updated 2 months ago
- manual mapping injector☆29Sep 28, 2025Updated 5 months ago
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Mar 29, 2025Updated 11 months ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆27Mar 9, 2024Updated last year
- ☆29Sep 17, 2024Updated last year
- Open-source EDR kernel-component for system monitoring and DLL injection☆33Nov 14, 2020Updated 5 years ago
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆91Nov 6, 2025Updated 3 months ago
- My research WIP bluepill hypervisor☆40Mar 15, 2023Updated 2 years ago