ytk2128 / api-monitor32
A simple tool for detecting memory modifications to Windows API.
☆22Updated last month
Alternatives and similar repositories for api-monitor32:
Users that are interested in api-monitor32 are comparing it to the libraries listed below
- Yet another Windows DLL injector.☆38Updated 3 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆28Updated 3 years ago
- Library for using direct system calls☆35Updated 3 weeks ago
- APC DLL Injector with NtQueueApcThread and wake up thread support☆42Updated 7 years ago
- Add an empty section to a PE file☆52Updated 7 years ago
- ☆15Updated 4 years ago
- Six cases demonstrating methods of optimizing GetProcAddress☆17Updated 3 years ago
- ☆25Updated 2 years ago
- ☆33Updated 3 years ago
- Load Dll into Kernel space☆38Updated 2 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆32Updated 3 years ago
- Process Injection: APC Injection☆29Updated 4 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- A ready-made template for a project based on libpeconv.☆44Updated 4 months ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆84Updated 2 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆60Updated 4 years ago
- A simple PE loader.☆25Updated 2 years ago
- Dynamically generated obfuscated jumps and/or function calls☆34Updated last year
- ☆18Updated 3 years ago
- ☆64Updated 2 years ago
- ☆22Updated last year
- My try to implement a virtual CPU in C☆19Updated last year
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆14Updated 4 years ago
- Command like tool to print mitigation flags for running processes in a memory dump☆46Updated 4 years ago
- SetWinEventHook Sample☆46Updated last year
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆54Updated 3 years ago
- Manually perform syscalls without going through any external API or DLL.☆18Updated last year
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- allowing um r/w through km from um ioctl ™☆11Updated 3 years ago
- A PoC tool for exploiting leaked process and thread handles☆30Updated last year