wwh1004 / MethodsMapLinks
A tool to show the method info at runtime
☆13Updated 6 years ago
Alternatives and similar repositories for MethodsMap
Users that are interested in MethodsMap are comparing it to the libraries listed below
Sorting:
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Updated 6 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Updated 7 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Updated 7 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Updated 10 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 7 years ago
- Trojan downloader simple virus☆16Updated 7 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Updated 7 years ago
- A kernel mode Windows rootkit in development.☆49Updated 4 years ago
- Anti-rootkit works as a Windows system driver.☆13Updated 3 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆20Updated 4 years ago
- ☆14Updated 6 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 5 years ago
- Execute an arbitrary command within the context of another process☆21Updated 6 years ago
- User-mode part of Zerokit platform☆22Updated 6 years ago
- exploit termdd.sys(support kb4499175)☆61Updated 6 years ago
- ☆11Updated 6 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Updated 6 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 7 years ago
- ☆17Updated 5 years ago
- An example of PE hollowing injection technique☆25Updated 6 years ago
- hooking KiUserApcDispatcher☆25Updated 8 years ago
- Windows Injection 101: from Zero to ROP (HITCON 2017)☆29Updated 8 years ago
- Code Injection technique written in cpp language☆34Updated 8 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Updated 6 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 6 years ago
- Process injection via KernelCallbackTable☆13Updated 4 years ago
- Win32 PE Anti-RE and Anti-debugging Framework☆13Updated 6 years ago
- Kernel mode windows NT API logger☆22Updated 6 years ago
- x86/x64 dll injector☆31Updated 3 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆28Updated 6 years ago