wwh1004 / MethodsMapLinks
A tool to show the method info at runtime
☆13Updated 6 years ago
Alternatives and similar repositories for MethodsMap
Users that are interested in MethodsMap are comparing it to the libraries listed below
Sorting:
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Updated 6 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Updated 7 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 7 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Updated 10 years ago
- ☆17Updated 5 years ago
- User-mode part of Zerokit platform☆22Updated 6 years ago
- x86/x64 dll injector☆31Updated 3 years ago
- A kernel mode Windows rootkit in development.☆49Updated 4 years ago
- exploit termdd.sys(support kb4499175)☆61Updated 6 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Updated 7 years ago
- Trojan downloader simple virus☆16Updated 7 years ago
- Win32 PE Anti-RE and Anti-debugging Framework☆13Updated 6 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Updated 6 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Updated 7 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- DarkRat source - beware untested source and resources.☆21Updated 6 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 6 years ago
- An example of PE hollowing injection technique☆25Updated 6 years ago
- Anti-rootkit works as a Windows system driver.☆13Updated 3 years ago
- Windows Malware Probe of Concept☆21Updated 3 years ago
- Kernel (Ring0) - SSDT unhook driver☆15Updated 7 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆20Updated 4 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Updated 6 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 6 years ago
- A collection of anti disassembly techniques☆19Updated 8 years ago
- ☆14Updated 6 years ago
- Remote PE reflective injection with a simple reflective loader☆32Updated 6 years ago
- Code Injection technique written in cpp language☆33Updated 7 years ago
- DarkRats Standalone HVNC☆24Updated 3 years ago
- Loader and RunPE file executer☆18Updated 6 years ago