wwh1004 / MethodsMapLinks
A tool to show the method info at runtime
☆13Updated 6 years ago
Alternatives and similar repositories for MethodsMap
Users that are interested in MethodsMap are comparing it to the libraries listed below
Sorting:
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Updated 6 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Updated 7 years ago
- Anti-rootkit works as a Windows system driver.☆13Updated 3 years ago
- Trojan downloader simple virus☆16Updated 7 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Updated 10 years ago
- x86/x64 dll injector☆31Updated 3 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 7 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Updated 6 years ago
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- DarkRat source - beware untested source and resources.☆22Updated 6 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Updated 7 years ago
- exploit termdd.sys(support kb4499175)☆61Updated 6 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 5 years ago
- ☆17Updated 5 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 6 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Updated 7 years ago
- hooking KiUserApcDispatcher☆25Updated 8 years ago
- User-mode part of Zerokit platform☆22Updated 6 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆40Updated 4 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Updated 6 years ago
- Code Injection technique written in cpp language☆33Updated 7 years ago
- An example of PE hollowing injection technique☆25Updated 6 years ago
- Kernel (Ring0) - SSDT unhook driver☆15Updated 7 years ago
- ☆11Updated 6 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Updated 5 years ago
- ☆14Updated 6 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Updated 6 years ago
- Phantom DLL Hollowing method implemented in modmap☆17Updated 4 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 7 years ago
- Execute an arbitrary command within the context of another process☆21Updated 6 years ago