wqreytuk / secureCRT_ALL_VERSION_DECRYPTORLinks
☆16Updated 2 years ago
Alternatives and similar repositories for secureCRT_ALL_VERSION_DECRYPTOR
Users that are interested in secureCRT_ALL_VERSION_DECRYPTOR are comparing it to the libraries listed below
Sorting:
- Convert native dll to shellcode, and support exported function☆23Updated 4 years ago
- iSwordSDK (Provide Powerful Kernel API For Ring3 Applications)☆15Updated 3 years ago
- Hide Port In Windows☆41Updated 11 months ago
- COM Explorer☆15Updated 7 months ago
- 编译时混淆字符串,以确保生成的二进制PE不会暴漏明文字符串。(C++ 14 及以上)☆28Updated 4 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆36Updated 2 years ago
- 针对windows rootkit的一些检测,分别从进程、端口、文件这三个方面进行检测。☆21Updated 8 months ago
- ☆20Updated last year
- shadow tls☆17Updated 2 years ago
- Kill Protected Process Light Process (include av)☆58Updated 2 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆44Updated 4 years ago
- Unlock files and folders☆14Updated 3 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆71Updated 3 years ago
- 废物自救项目!一起向光而行!!!☆11Updated 3 years ago
- Call NtCreateUserProcess directly as normal.☆75Updated 3 years ago
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆58Updated 2 weeks ago
- Windows CVE主防(HIPS/HIDS)☆56Updated 4 years ago
- 内存加载DLL 支持X86和X64(Memory PELoader Support X86 and X64)☆36Updated 2 years ago
- 横向移动三剑客 ( Lateral movement tools)☆30Updated 3 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Updated 3 years ago
- This is a random process injector, and more injection techniques will be added in the future.☆13Updated 5 years ago
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆53Updated 4 years ago
- windwos内核研究与驱动Code☆66Updated 3 years ago
- ☆33Updated 2 years ago
- ☆22Updated 4 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆35Updated 2 years ago
- 向pyc中插入python代码或shellcode☆18Updated last year
- 从admin冲到TrustedInstaller☆17Updated 2 years ago
- Implementation of several code injection techniques.☆24Updated 3 years ago
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆16Updated 4 years ago