secana / CertDump
Dump certificates from PE files in different formats
☆38Updated last year
Alternatives and similar repositories for CertDump:
Users that are interested in CertDump are comparing it to the libraries listed below
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆21Updated 4 years ago
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 2 years ago
- Code samples that serve as references for Windows API functions☆31Updated 11 months ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated 2 years ago
- SetWinEventHook Sample☆47Updated last year
- A simple PE loader.☆26Updated 2 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆16Updated 10 months ago
- Example of building an application verifer DLL☆46Updated 11 months ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- A ready-made template for a project based on libpeconv.☆48Updated 2 months ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Updated last year
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆35Updated 4 months ago
- ☆17Updated 9 months ago
- A Proof-of-Concept implementation for Proxy Object Obfuscation in .NET☆47Updated 2 years ago
- Clone running process with ZwCreateProcess☆57Updated 4 years ago
- Sample for Creating a new kernel object type and supporting API☆24Updated 8 months ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆32Updated 3 years ago
- Demos and presentation from SECArmy Village Grayhat 2020☆38Updated 2 years ago
- Windows process injection methods☆16Updated 5 years ago
- ☆25Updated 2 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆41Updated 6 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆104Updated 2 years ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆39Updated last year
- An example pattern in C# for using WMI to monitor process creation and termination events.☆52Updated 6 years ago
- Runs programs as TrustedInstaller☆49Updated 5 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆32Updated 10 months ago
- Learning Process Injection and Hollowing techniques☆41Updated 2 years ago
- A simple POC to demonstrate the power of .NET debugging for injection☆72Updated 4 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆22Updated last year