strobejb / injdll
DLL Injection commandline utility
☆26Updated 11 years ago
Alternatives and similar repositories for injdll:
Users that are interested in injdll are comparing it to the libraries listed below
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 7 years ago
- wow64 syscall filter☆13Updated 10 years ago
- ☆12Updated 9 years ago
- Demos presented on Hackerfest 2015☆14Updated 9 years ago
- Decompile an x86 exe, and read PE infos.☆19Updated 6 years ago
- An aggregate of tools used in the core of vmp_dbg plus other parsing utils to parse vmp bc.☆15Updated 8 years ago
- Analysis and Modification Tool for Executables☆16Updated 5 years ago
- ☆9Updated 8 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 8 years ago
- Malware monitor template based on MinHook☆16Updated 9 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 9 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆10Updated 9 years ago
- windows create process with a dll load first time via LdrHook☆30Updated 8 years ago
- Code Injector Using Code Caves☆14Updated 9 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆12Updated 8 years ago
- Hook APIs and send data back to another process with Google Protobufs☆2Updated 2 years ago
- Various libraries focused on examining/parsing NTFS-specific structures☆16Updated 9 years ago
- reversed emet tool☆24Updated 12 years ago
- ASProtect reverse engineering & analysis WinDbg extension☆20Updated 4 years ago
- Anti-AV compilation☆42Updated 11 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆13Updated 10 years ago
- PE32 binary + W32 payload☆12Updated 7 years ago
- Notes my learning steps about Windows-NT☆23Updated 7 years ago
- use crystalCPUID to identify vt-x & amd-v☆16Updated 9 years ago
- Framework complet d'analyse de malware☆12Updated 8 years ago
- Reverse engineered vmware workstation code to aid in kernel debugging.☆14Updated 9 years ago
- A system call tracer☆10Updated 10 years ago
- A c++, QT gui based memory engine☆13Updated 6 years ago
- ☆18Updated 5 years ago
- Event Tracing for Windows Custom Events☆21Updated 10 years ago