rcanzanese / SystemCallServiceLinks
Process / thread-level system call tracer for Windows 7 / 8 / 2008 / 2012
☆21Updated 10 years ago
Alternatives and similar repositories for SystemCallService
Users that are interested in SystemCallService are comparing it to the libraries listed below
Sorting:
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 8 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆57Updated 9 years ago
- ☆34Updated 8 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 10 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Updated 10 years ago
- Anti-AV compilation☆44Updated 12 years ago
- Bootkits Revisited☆40Updated 11 years ago
- Decrement Windows Kernel for fun and profit☆39Updated 8 years ago
- User-mode hook bypassing method☆33Updated 9 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆76Updated 6 years ago
- CAPE monitor DLLs☆41Updated 6 years ago
- ☆34Updated 7 years ago
- libemu shim layer and win32 environment for Unicorn Engine☆73Updated 8 years ago
- Load a Windows Kernel Driver☆94Updated 8 years ago
- metamorphic engine in python☆34Updated 9 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Updated 8 years ago
- Blog posts☆29Updated 5 years ago
- Simple PE packer with RtlCompressBuffer☆21Updated 10 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆99Updated 4 years ago
- Just another tool to download specify Symbol (.pdb) files☆39Updated 6 years ago
- drvtriks kernel driver for Windows 7 SP1 and 8.1 x64, that tricks around in your system.☆34Updated 8 years ago
- ☆16Updated 8 years ago
- Enumerate Windows Defender threat families and dump their names according category☆93Updated 6 years ago
- deprecated☆27Updated 6 years ago
- Full DLL Hooking, phrack 65☆53Updated 2 years ago
- ☆30Updated 8 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- ransomware_begone☆42Updated 9 years ago
- Simple proof of concept code for injecting libraries on 64bit processes from a 32bit process☆96Updated 7 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago