secana / CertDumpLinks
Dump certificates from PE files in different formats
☆38Updated 2 years ago
Alternatives and similar repositories for CertDump
Users that are interested in CertDump are comparing it to the libraries listed below
Sorting:
- An example pattern in C# for using WMI to monitor process creation and termination events.☆53Updated 7 years ago
- Runs programs as TrustedInstaller☆49Updated 6 years ago
- Clone running process with ZwCreateProcess☆59Updated 5 years ago
- Learning Process Injection and Hollowing techniques☆42Updated 3 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆66Updated 2 years ago
- Easy XOR string encryption for NET based binaries☆140Updated 2 years ago
- A Proof-of-Concept implementation for Proxy Object Obfuscation in .NET☆47Updated 3 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆111Updated 3 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆42Updated 6 years ago
- A lightweight .NET assembly dependency merger that uses dnLib and 7zip's LZMA SDK for compressing dependant assemblies.☆105Updated last year
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆31Updated 2 years ago
- SetWinEventHook Sample☆50Updated 2 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- Think APIMonitor, but for .NET binaries.☆56Updated 2 years ago
- A simple POC to demonstrate the power of .NET debugging for injection☆73Updated 5 years ago
- ☆18Updated 6 years ago
- Win32 memory leak detector with ETW☆47Updated 8 years ago
- ☆29Updated 3 years ago
- Manually perform syscalls without going through any external API or DLL.☆19Updated 2 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated 5 months ago
- ☆26Updated 3 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆39Updated 5 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆22Updated 4 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Updated last week
- A Practical example of ELAM (Early Launch Anti-Malware)☆36Updated 4 years ago
- Hide code from dnSpy and other C# spying tools☆42Updated 5 years ago
- Sample for Creating a new kernel object type and supporting API☆26Updated last year
- ☆37Updated 4 years ago
- Windows process injection methods☆19Updated 6 years ago