weewoo22 / memflow-shellcodeLinks
Shellcode execution for memflow
☆13Updated 3 years ago
Alternatives and similar repositories for memflow-shellcode
Users that are interested in memflow-shellcode are comparing it to the libraries listed below
Sorting:
- Rust bindings for VMProtect.☆27Updated last year
- Process Injection via Component Object Model (COM) IRundown::DoCallback().☆64Updated 3 years ago
- DLL 转 发工具方法。☆54Updated 2 years ago
- Minimalistic Windows Kernel Allocator.☆51Updated last year
- Read Memory without ReadProcessMemory for Current Process☆89Updated 3 years ago
- Rust port of kdmapper☆22Updated 4 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆44Updated 4 years ago
- ☆39Updated 2 years ago
- Reflective DLL self-loading as a library☆21Updated 9 months ago
- ☆34Updated 2 years ago
- A thin Rust wrapper around Windows' hardware breakpoints.☆21Updated 3 years ago
- Small handy tool for crafting shellcodes by hand.☆18Updated 3 years ago
- Black cat magic ฅ(^・ω・^ฅ ✿)☆55Updated 3 years ago
- a tiny code that performs kernel-mode read/write using CVE-2023-38817.☆18Updated 10 months ago
- improved shellcode template for b1tg/rust-windows-shellcode☆29Updated 4 years ago
- Proof-of-Concept software for detecting AV/EDR hooks in Windows libraries.☆36Updated 3 years ago
- Windows API Call Obfuscation☆112Updated 3 years ago
- Hides processes from the windows task manager using IAT hooking.☆22Updated 4 years ago
- PoC exploit for HP Hardware Diagnostic's EtdSupp driver☆50Updated 2 years ago
- Rust implementation of lazy_importer☆59Updated 2 years ago
- Dynamic rust bindings to the Windows API☆17Updated 4 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆21Updated 3 years ago
- Inject a shellcode in a remote process using Process Hollowing.☆54Updated 4 years ago
- LdrLoadDll Unhooking☆135Updated 4 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35Updated 2 years ago
- x86-64 virtualizing obfuscator written in Rust☆78Updated 2 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆40Updated 4 years ago
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆61Updated last week
- Dynamically generated obfuscated jumps and/or function calls☆38Updated 2 years ago
- Bypass UAC by abusing the Internet Explorer Add-on installer☆57Updated 4 years ago