sha0coder / mwemu
x86 malware emulator
☆210Updated 3 weeks ago
Alternatives and similar repositories for mwemu:
Users that are interested in mwemu are comparing it to the libraries listed below
- BYOVD: Loading dbk64.sys and grabbing a handle to it☆148Updated 2 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆243Updated 2 years ago
- Yet another variant of Process Hollowing☆376Updated 3 weeks ago
- a PE Loader and Windows API tracer. Useful in malware analysis.☆138Updated 2 years ago
- A simple ptrace-less shared library injector for x64 Linux☆253Updated 2 years ago
- Kernel Exploits☆247Updated 3 years ago
- ☆157Updated 3 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆228Updated 3 years ago
- FreshyCalls tries to make the use of syscalls comfortable and simple, without generating too much boilerplate and in modern C++17!☆321Updated 2 years ago
- Static Binary Instrumentation tool for Windows x64 executables☆196Updated 2 weeks ago
- PoC capable of detecting manual syscalls from usermode.☆191Updated 3 months ago
- A DTrace on Windows Reimplementation☆338Updated 2 weeks ago
- Reverse engineered source code of the autochk rootkit☆202Updated 5 years ago
- ☆141Updated last year
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆148Updated last year
- Abusing exceptions for code execution.☆109Updated 2 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆269Updated 4 months ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆160Updated 2 months ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆224Updated 2 years ago
- Set of antianalysis techniques found in malware☆129Updated last year
- Bindings for Microsoft WinDBG TTD☆215Updated last year
- Yet another windows internals repo☆204Updated 3 years ago
- Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction wit…☆214Updated 2 years ago
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆179Updated 3 years ago
- ☆294Updated 3 years ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆173Updated last year
- A more stealthy variant of "DLL hollowing"☆335Updated 11 months ago
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆149Updated 4 years ago
- Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the …☆331Updated last week
- A way to delete a locked file, or current running executable, on disk.☆512Updated 6 months ago