ytk2128 / api-monitor32
A simple tool for detecting memory modifications to Windows API.
☆22Updated 4 months ago
Alternatives and similar repositories for api-monitor32
Users that are interested in api-monitor32 are comparing it to the libraries listed below
Sorting:
- SetWinEventHook Sample☆47Updated last year
- Add an empty section to a PE file☆51Updated 7 years ago
- Yet another Windows DLL injector.☆39Updated 3 years ago
- A compact tool for detecting AV/EDR hooks in default Windows libraries.☆31Updated 3 years ago
- ☆25Updated 2 years ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆87Updated last month
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆14Updated 4 years ago
- Load Dll into Kernel space☆38Updated 2 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆42Updated 3 years ago
- Clone running process with ZwCreateProcess☆57Updated 4 years ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆28Updated 3 weeks ago
- ☆18Updated 4 years ago
- Six cases demonstrating methods of optimizing GetProcAddress☆17Updated 3 years ago
- APC DLL Injector with NtQueueApcThread and wake up thread support☆44Updated 7 years ago
- My try to implement a virtual CPU in C☆19Updated last year
- A ready-made template for a project based on libpeconv.☆48Updated 2 months ago
- Library for using direct system calls☆35Updated 3 months ago
- Record & prevent file deletion in kernel mode☆43Updated 4 years ago
- A simple password-based PE encryptor for Windows 32-bit executables.☆52Updated 4 months ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Updated 3 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆28Updated 3 years ago
- ☆15Updated 4 years ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆36Updated 4 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- Dynamically generated obfuscated jumps and/or function calls☆35Updated 2 years ago
- exploit termdd.sys(support kb4499175)☆59Updated 5 years ago
- Process Injection: APC Injection☆32Updated 4 years ago
- A kernel mode Windows rootkit in development.☆48Updated 3 years ago
- ☆31Updated 4 years ago