stormshield / HiveSwarming
Convert .reg to registry hive and reciprocally, without elevation
☆19Updated 2 months ago
Alternatives and similar repositories for HiveSwarming:
Users that are interested in HiveSwarming are comparing it to the libraries listed below
- Example/starter code for custom Windows application compatibility shims☆33Updated 4 years ago
- This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCo…☆16Updated 8 months ago
- SetWinEventHook Sample☆46Updated last year
- An x64dbg plugin which marks XFG call signatures as data☆73Updated last year
- ☆20Updated 2 months ago
- Code samples that serve as references for Windows API functions☆30Updated 10 months ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆39Updated 11 months ago
- Windows PDB Parser using Imagehlp library.☆16Updated 2 years ago
- Windows kernel PDB data parsed into YAML☆36Updated 4 months ago
- Windows 11 Syscall table. Ready to use in direct syscall. Actively maintained.☆22Updated 3 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆35Updated 3 months ago
- Remote Thread Detection with a Kernel Driver☆30Updated 2 months ago
- A simple PE loader.☆25Updated 2 years ago
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆26Updated last year
- Signature finder (from PE-bear)☆36Updated 9 months ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆32Updated 3 years ago
- A ready-made template for a project based on libpeconv.☆46Updated last month
- A template for projects using both libPeConv and MS Detours☆14Updated last year
- Enabled / Disable LSA Protection via BYOVD☆66Updated 3 years ago
- ☆16Updated 8 months ago
- Proof-of-concept modular implant platform leveraging v8☆51Updated last month
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆34Updated 3 years ago
- ☆16Updated 2 years ago
- Small visualizator for PE files☆67Updated last year
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆24Updated 9 months ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆30Updated 9 months ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆20Updated 4 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆16Updated 9 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆20Updated 2 months ago