zodiacon / MalDevWorkshopWebinar
Demo from the Malware Analysis and Development Webinar
☆20Updated 10 months ago
Alternatives and similar repositories for MalDevWorkshopWebinar:
Users that are interested in MalDevWorkshopWebinar are comparing it to the libraries listed below
- Remote Thread Detection with a Kernel Driver☆28Updated last month
- Next gen process injection technique☆44Updated 4 years ago
- Reimplementation of the KExecDD DSE bypass technique.☆46Updated 5 months ago
- Piece of code to detect and remove hooks in IAT☆63Updated 2 years ago
- Example of building an application verifer DLL☆45Updated 9 months ago
- ☆85Updated 6 months ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆30Updated 8 months ago
- shell code example☆31Updated last week
- ☆37Updated last week
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆23Updated 7 months ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆97Updated last year
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- List the ETW provider(s) in the registration table of a process.☆57Updated last year
- SetWinEventHook Sample☆46Updated last year
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆17Updated 9 months ago
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆32Updated 3 years ago
- In-memory hiding technique☆45Updated last month
- ☆106Updated 2 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆36Updated 6 months ago
- API Hammering with C++20☆45Updated 2 years ago
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping☆52Updated 2 years ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆16Updated 7 months ago
- Monitors ETW for security relevant syscalls maintaining the set called by each unique process☆72Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆42Updated last year
- Finding Truth in the Shadows☆88Updated 2 years ago
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆25Updated 9 months ago
- ☆52Updated last month
- ☆80Updated 6 months ago