senrab / Fake-AntiVirus
☆28Updated this week
Related projects: ⓘ
- Reverse engineering toolkit for exploit/malware analysis☆34Updated 4 years ago
- ☆24Updated this week
- ☆15Updated 5 years ago
- ☆32Updated this week
- Kernel Shellcode to add all privileges in token☆13Updated 7 years ago
- Miscellaneous old Exploit code and PoCs☆15Updated 4 years ago
- ☆11Updated this week
- Kernel-mode file scanner☆17Updated 6 years ago
- Static analysis tools for x86 assembly☆13Updated 7 years ago
- ☆11Updated this week
- ☆13Updated 7 years ago
- ☆25Updated this week
- Continuation of the popular patchdiff IDA plugin☆10Updated 10 years ago
- Injectable Windows DLL which enforces a W^X memory policy on a process☆14Updated 7 years ago
- ☆45Updated 6 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆18Updated 8 years ago
- ☆22Updated 7 years ago
- A library for interacting with Windows process memory☆7Updated 6 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆21Updated 7 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆13Updated 5 years ago
- KernelBugTest☆15Updated 6 years ago
- Analysis and Modification Tool for Executables☆16Updated 5 years ago
- ☆9Updated 7 years ago
- wow64 syscall filter☆13Updated 9 years ago
- Malware monitor template based on MinHook☆16Updated 9 years ago
- PE32 binary + W32 payload☆12Updated 7 years ago
- ☆12Updated this week