silverf0x / RpcView
RpcView is a free tool to explore and decompile Microsoft RPC interfaces
☆967Updated last year
Alternatives and similar repositories for RpcView:
Users that are interested in RpcView are comparing it to the libraries listed below
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,213Updated 2 months ago
- Obfuscate specific windows apis with different apis☆1,000Updated 4 years ago
- Windows Object Explorer 64-bit☆1,747Updated 3 weeks ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆811Updated 3 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆598Updated 7 years ago
- WinDBG Anti-RootKit Extension☆629Updated 4 years ago
- Portable Executable parsing library (from PE-bear)☆658Updated last week
- Protected Processes Light Killer☆927Updated 2 years ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,215Updated last year
- Windows NT Syscall tables☆1,276Updated last month
- ☆786Updated 2 years ago
- ☆812Updated 5 years ago
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆720Updated 6 months ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆607Updated 2 years ago
- Driver loader for bypassing Windows x64 Driver Signature Enforcement☆1,114Updated 5 years ago
- A small, null-free Windows shellcode that executes calc.exe (x86/x64, all OS/SPs)☆415Updated 11 months ago
- Extract Windows Defender database from vdm files and unpack it☆440Updated 5 years ago
- A Pin Tool for tracing API calls etc☆1,419Updated last week
- Converts a DLL into EXE☆810Updated last year
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,268Updated last year
- Shellcode Compiler☆1,099Updated 8 months ago
- Native API header files for the System Informer project.☆1,165Updated last month
- XNTSV program for detailed viewing of system structures for Windows.☆460Updated this week
- Process Monitor X v2☆611Updated last year
- Windows NT x64 syscall fuzzer☆603Updated last year
- Demos of various injection techniques found in malware☆791Updated 3 years ago
- Quickly debug shellcode extracted during malware analysis☆603Updated last year
- An extensible framework for easily writing compiler optimized position independent x86 / x64 shellcode for windows platforms.☆517Updated 5 years ago
- Position Independent Windows Shellcode Written in C☆291Updated 6 years ago
- AV/EDR evasion via direct system calls.☆1,867Updated 2 years ago