trietptm / HideToolz-ArchiveLinks
HideToolz 2.2 w/ support Windows 7 (7601) http://fyyre.ru/vault/hidetoolz.7z
☆13Updated 4 years ago
Alternatives and similar repositories for HideToolz-Archive
Users that are interested in HideToolz-Archive are comparing it to the libraries listed below
Sorting:
- Bare Knuckled AV Breaking☆58Updated 7 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- Anti-rootkit works as a Windows system driver.☆13Updated 3 years ago
- A tool to show the method info at runtime☆13Updated 6 years ago
- Windows Malware Probe of Concept☆21Updated 3 years ago
- Zerokit shared code☆17Updated 6 years ago
- User-mode part of Zerokit platform☆22Updated 6 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Updated 11 months ago
- ☆11Updated 7 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 3 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Code injection via delay load libraries☆35Updated 8 years ago
- 来自Freebuf评论区,一个UEFI马.☆49Updated 8 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆29Updated 6 years ago
- ☆27Updated 9 years ago
- Analysis and Modification Tool for Executables☆17Updated 6 years ago
- Kernel (Ring0) - SSDT unhook driver☆15Updated 7 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆20Updated 6 years ago
- Monitor Files and Folders for Changes in Real Time .☆10Updated 6 years ago
- Tracing and parsing an executing binary file☆29Updated 10 years ago
- My manual analysis of malware families☆13Updated 8 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 7 years ago
- Dalvik Header Plugin for IDA Pro☆23Updated 12 years ago
- ☆38Updated 8 years ago
- Various Crypter Project☆10Updated 11 years ago
- Debugger checks in 3 ways☆19Updated 7 years ago
- ☆24Updated 6 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Updated 4 years ago