webees / ADkiller
Fixed memory overflow issue in ProcessHider.
☆16Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for ADkiller
- ☆26Updated 7 years ago
- win7 apc注入不支持win10☆18Updated 5 years ago
- windows inlinehook R3 R0☆11Updated 6 years ago
- Basic Injector running on x64 machines that is able to load into x64 AND x86 processes☆20Updated 5 years ago
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆49Updated 3 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆33Updated 9 years ago
- x86/x64 dll injector☆29Updated 2 years ago
- windows rpc 使用MIDL+RPC实现HelloWorld☆21Updated 6 years ago
- map driver to memory☆25Updated 6 years ago
- A working version of this tutorial: https://docs.microsoft.com/en-us/windows/desktop/rpc/tutorial☆16Updated 5 years ago
- ☆40Updated 5 years ago
- ☆16Updated 5 years ago
- x64 Kernel Hooks Detection☆24Updated 7 years ago
- Easily hook WIN32 x64 functions☆17Updated last week
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentation…☆19Updated 7 years ago
- 粗暴地枚举管理内核的WFP对象。 Manage kernel WFPs in a brutal way.☆26Updated 6 years ago
- fork HoShiMin Avanguard☆19Updated 6 years ago
- A Proof-of-Concept win32 DLL that makes use of netbios session token replay to propagate through a Windows Domain☆24Updated 6 years ago
- HTTP/HTTPS/DNS inspector (windows driver)☆24Updated 5 years ago
- Protected Process Light Library☆18Updated 4 years ago
- 安全卫士项目☆32Updated 7 years ago
- using gpuz to load driver☆31Updated 5 years ago
- 驱动层拦截web访问源码☆29Updated 6 years ago
- Map memory to user space and manipulate user memory, using capmon☆23Updated 6 years ago
- vmware-backdoor☆33Updated 3 years ago
- Open-source EDR kernel-component for system monitoring and DLL injection☆30Updated 4 years ago