un4ckn0wl3z / AbuseWin32Links
Collection of Win32 with C++/Assembly for Hooking, Patch and Reversing PE file
☆15Updated 2 years ago
Alternatives and similar repositories for AbuseWin32
Users that are interested in AbuseWin32 are comparing it to the libraries listed below
Sorting:
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆19Updated 3 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- Phantom DLL Hollowing method implemented in modmap☆17Updated 4 years ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16Updated 3 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Updated 3 years ago
- Code injection via ZwCreateSection, ZwUnmapViewOfSection. C++ example☆17Updated 3 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆43Updated 3 years ago
- An attempt at reversing WindowsDefender☆20Updated 9 months ago
- A C/C++/Asm template for PIC malware☆10Updated 9 months ago
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- Using Thread Description To Hide Shellcodes☆14Updated 2 years ago
- ☆11Updated 3 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆21Updated 4 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆40Updated 4 years ago
- Yet another Windows DLL injector.☆39Updated 3 years ago
- Rookit and anti rookit on Windows platform☆12Updated last year
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆14Updated 4 years ago
- Load Dll into Kernel space☆38Updated 2 years ago
- Fake Timestamps of Driver Certificates while keeping validity.☆18Updated 4 years ago
- ☆8Updated last year
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆23Updated 2 years ago
- Remote PE reflective injection with a simple reflective loader☆31Updated 6 years ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆42Updated 2 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Updated 3 years ago
- Process Hollowing Packer☆27Updated 7 years ago
- Proof-of-Concept software for detecting AV/EDR hooks in Windows libraries.☆31Updated 3 years ago
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory☆13Updated last year
- Detect BypassUAC using AMSI☆26Updated 4 months ago
- Manually perform syscalls without going through any external API or DLL.☆19Updated 2 years ago