revsic / PacketInjectorLinks
Detect HTTP packet and inject redirect packet
☆14Updated 7 years ago
Alternatives and similar repositories for PacketInjector
Users that are interested in PacketInjector are comparing it to the libraries listed below
Sorting:
- windows create process with a dll load first time via LdrHook☆30Updated 8 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 8 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- The dll that can hide itself and then delete itselft.☆30Updated 12 years ago
- OpenHIPS prevents exploitation of Windows systems☆35Updated 12 years ago
- Wow64 syscall hook☆40Updated 8 years ago
- Kernel (Ring0) - SSDT unhook driver☆14Updated 7 years ago
- ☆25Updated 4 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Updated 11 years ago
- Bootkit for Windows 7☆29Updated 11 years ago
- A MITM proxy server for reflective DLL injection through WinINet☆15Updated 7 years ago
- windows kernel File redirection☆20Updated 10 years ago
- ☆19Updated 9 years ago
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Updated 8 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago
- Kernel mode windows NT API logger☆22Updated 5 years ago
- Class implementation of PowerLoader injection technique☆31Updated 8 years ago
- Anti-AV compilation☆44Updated 11 years ago
- Simple PE packer with RtlCompressBuffer☆21Updated 9 years ago
- Analysis and Modification Tool for Executables☆17Updated 6 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆28Updated 11 years ago
- OllyCallTrace is a plugin for OllyDbg to trace the call chain of a thread.☆53Updated 13 years ago
- Introduce you to shellcode development.☆23Updated 9 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago
- User-mode hook bypassing method☆33Updated 8 years ago
- ☆21Updated 7 years ago
- User-mode part of Zerokit platform☆22Updated 6 years ago
- PoC for detecting and dumping process hollowing code injection☆51Updated 6 years ago
- Kernel-Mode rootkit that connects to a remote server to send & recv commands☆33Updated 6 years ago