thebowenfeng / task-manager-hider
☆31Updated 2 years ago
Alternatives and similar repositories for task-manager-hider:
Users that are interested in task-manager-hider are comparing it to the libraries listed below
- ☆8Updated 2 years ago
- codecave hook reverse engineering toolkit.☆36Updated last year
- ☆55Updated last year
- ☆25Updated 3 years ago
- Fud Runpe Av Evasion / All Av Bypass☆32Updated last year
- A Scantime Crytper that applies an obfuscation method onto a malware/false-positive so an antivirus cannot successfully match it with any…☆16Updated 3 years ago
- Скрытие процессов и файлов в user mode☆20Updated 5 years ago
- proof of concept of user-mode anti-breakpoint technique☆14Updated last year
- Injecting shellcode into a process memory and executing it in C#☆53Updated 2 years ago
- I am not responsible for what is done with this project. This tool is solely written to be studied by other security researchers to see h…☆22Updated last year
- Sugar Guard☆28Updated 2 years ago
- Obfuscator To Protect .NET Assemblies From Being Reverse Engineered.☆38Updated 3 years ago
- Read and Write process memory with this ioctl driver base. This is great for free cheats and learning kernel.☆73Updated 8 months ago
- Overwrites the whole PE Header☆18Updated 4 years ago
- Simple tool to extract and decompress embedded resources processed by Fody Costura☆65Updated 6 months ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Updated last year
- ☆20Updated 3 months ago
- TS-Changer - Forces the machine in/out of TestSigning Mode at runtime.☆66Updated last year
- A simple tool to assemble shellcode ready to be copy-pasted into code☆67Updated 2 years ago
- It contains malicious features that can steal files from BitRAT tools.☆11Updated 3 years ago
- Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯☆42Updated 3 years ago
- Kernel<->Usermode shared memory communcation using manually mapped driver☆11Updated 3 years ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆30Updated 10 months ago
- ☆121Updated 2 years ago
- PE Header (.rdata,.data,.text) obsfucation☆35Updated 2 years ago
- ☆43Updated last year
- meme hwid spoofer driver. If you need an undetected HWID spoofer use Cheato Spoofer @ https://chea.to☆34Updated 2 months ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆28Updated 3 months ago
- Bypass using kernel driver (not finish).☆19Updated last year
- minimal msvc-windows exclusive lazy importer for C++☆32Updated 3 years ago