wwh1004 / MethodsMapLinks
A tool to show the method info at runtime
☆13Updated 6 years ago
Alternatives and similar repositories for MethodsMap
Users that are interested in MethodsMap are comparing it to the libraries listed below
Sorting:
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆21Updated 6 years ago
- Trojan downloader simple virus☆16Updated 6 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 7 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Monitor Files and Folders for Changes in Real Time .☆10Updated 6 years ago
- ☆14Updated 5 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 6 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Updated 10 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- Anti-rootkit works as a Windows system driver.☆13Updated 3 years ago
- ☆11Updated 6 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Updated 6 years ago
- C++ Host .NET CLR & Run a assembly directly from ressource (RT_RCDATA) without extraction disk.☆15Updated 2 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 5 years ago
- x86/x64 dll injector☆31Updated 3 years ago
- ☆17Updated 5 years ago
- Phantom DLL Hollowing method implemented in modmap☆18Updated 4 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆33Updated 6 years ago
- Execute an arbitrary command within the context of another process☆20Updated 6 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆20Updated 7 years ago
- DarkRat source - beware untested source and resources.☆22Updated 5 years ago
- exploit termdd.sys(support kb4499175)☆60Updated 6 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆20Updated 4 years ago
- Analysis and Modification Tool for Executables☆17Updated 6 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- Loader and RunPE file executer☆18Updated 6 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆40Updated 4 years ago
- An opensource API hooking framework☆22Updated 5 years ago