tandasat / Scavenger
A minifilter driver preserves all modified and deleted files.
☆80Updated 9 years ago
Alternatives and similar repositories for Scavenger:
Users that are interested in Scavenger are comparing it to the libraries listed below
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆53Updated 5 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆76Updated 9 years ago
- A software driver that lets you log kernel-mode debug output into a file on Windows.☆98Updated 6 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆75Updated 13 years ago
- Windows anti-rootkit library☆38Updated 9 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆55Updated 6 years ago
- Windows driver including couple different techniques for file removal when regular operation isn't possible.☆67Updated 8 years ago
- Anti-Anti-VM solution via Windows Driver☆57Updated 6 years ago
- Windbg extension to find PatchGuard pages☆118Updated 10 years ago
- Generates a Python script to give public interface names in an ActiveX file to an IDB file.☆48Updated 3 years ago
- A-Protect Anti Rootkit Tool☆53Updated 10 years ago
- Helper utility for debugging windows PE/PE+ loader.☆51Updated 9 years ago
- This is a VmProtect integrated debugger, that will essentially allow you to disasm and debug vmp partially virtualized functions at the v…☆45Updated 8 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆56Updated 6 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub☆76Updated 12 years ago
- WinDbg debugger extension library providing various tools to analyse, dump and fix (restore) Microsoft Portable Executable files for both…☆82Updated 4 months ago
- Advance LPC☆60Updated 7 years ago
- A command line tool to load and unload a device driver.☆46Updated 7 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆50Updated 4 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆103Updated 4 years ago
- ☆45Updated 6 years ago
- ☆27Updated 5 years ago
- Simple proof of concept code for injecting libraries on 64bit processes from a 32bit process☆94Updated 6 years ago
- ☆38Updated 5 years ago
- POC of sysenter x64 LSTAR MSR hook☆38Updated 10 years ago
- Automatically exported from code.google.com/p/wskudp☆43Updated 8 years ago
- Intel Virtualization Technology demo☆65Updated 8 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆139Updated 5 years ago