An example malicious payload controller and obfuscator assisted by TPM-protected keys
☆39Aug 10, 2014Updated 11 years ago
Alternatives and similar repositories for tpm-malcrypt
Users that are interested in tpm-malcrypt are comparing it to the libraries listed below
Sorting:
- PE/PE +(64bit) Viewer (Qt 5.8)☆10Aug 3, 2018Updated 7 years ago
- WinPCAP for NDIS 6.x☆14Jun 24, 2019Updated 6 years ago
- Lists work items being queued currently.☆14Jun 7, 2015Updated 10 years ago
- ☆10Jan 7, 2017Updated 9 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- Today Plugin (x64) - A Plugin For x64dbg☆13Jul 17, 2018Updated 7 years ago
- WN8OS's Not a x86 Operating System: a tiny x64 operating system, for studying purpose.☆15Aug 2, 2015Updated 10 years ago
- Android runtime jit binary file parser☆13Dec 20, 2017Updated 8 years ago
- An Multiboot Compliant X64 SMP Operating Systems☆13Oct 17, 2013Updated 12 years ago
- ☆11Mar 11, 2015Updated 10 years ago
- an efficient yet easy to use network packet builder and parser☆11Jul 3, 2017Updated 8 years ago
- A future hobby OS kernel☆11Nov 8, 2020Updated 5 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- ☆10Sep 29, 2019Updated 6 years ago
- Pafish4vs is based on [Pafish]( https://github.com/a0rtega/pafish) , just ported to the VS (VC) compiler (X64 , X86) .☆12Aug 19, 2016Updated 9 years ago
- ☆17Oct 24, 2016Updated 9 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- Ssdt Hook Detection tool☆13Nov 11, 2016Updated 9 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago
- Open-Source Anti-RMT-Spam Firewall☆12Mar 28, 2016Updated 9 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- A driverless driver that is supposed to be manually mapped, usually by using TDL exploit. The driver shows how to read/write to any proce…☆22Oct 27, 2017Updated 8 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- UEFI SLIC injector alternate method☆20Oct 9, 2016Updated 9 years ago
- ☆13Jun 20, 2013Updated 12 years ago
- Native module dumper☆13Aug 28, 2017Updated 8 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- ☆11Sep 28, 2017Updated 8 years ago
- Detect the SCI in windows.☆11Mar 23, 2017Updated 8 years ago
- Hidden module/dll detector for windows apps☆15May 21, 2017Updated 8 years ago
- A remote desktop control suite☆16Jun 28, 2014Updated 11 years ago
- Securing Data Analytics on Intel SGX using Randomization☆13Aug 30, 2017Updated 8 years ago
- PE Infector/Cryptor source code☆16Apr 30, 2017Updated 8 years ago
- A hack for WolfTeam (FPS). Developed and commercialized many years ago.☆12Oct 29, 2017Updated 8 years ago
- League Sandbox's Replay Inspector☆12Sep 6, 2018Updated 7 years ago