zodiacon / NativeAppsLinks
Demos and presentation from SECArmy Village Grayhat 2020
☆37Updated 2 years ago
Alternatives and similar repositories for NativeApps
Users that are interested in NativeApps are comparing it to the libraries listed below
Sorting:
- A small library helping to parse commandline parameters (for C/C++)☆57Updated 3 months ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆36Updated 4 years ago
- Blog posts☆30Updated 5 years ago
- Sysmon shenanigans☆66Updated 4 years ago
- ☆22Updated 5 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 6 years ago
- A set of small utilities, helpers for PIN tracers☆33Updated last year
- Headers for linking your software with ntdll.dll☆15Updated 4 years ago
- Clone running process with ZwCreateProcess☆58Updated 4 years ago
- NT AUTHORITY\SYSTEM☆39Updated 5 years ago
- C Header Only Library for Virii☆10Updated 4 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆35Updated 4 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated last month
- Enumerate user mode shared memory mappings on Windows.☆123Updated 4 years ago
- PoC for hiding PE exports☆67Updated 4 years ago
- ☆23Updated 4 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆62Updated last year
- Windows GPU rootkit PoC by Team Jellyfish☆36Updated 10 years ago
- Writing WDF Drivers I: Core Concepts Lab Material☆53Updated 2 years ago
- A DLL that serves OutputDebugString content over a TCP connection☆35Updated 3 years ago
- ☆63Updated last year
- ☆50Updated 5 years ago
- Miscellaneous Code and Docs☆82Updated 2 months ago
- API Set Viewer☆92Updated 7 months ago
- ☆18Updated 4 years ago
- A ready-made template for a project based on libpeconv.☆46Updated 6 months ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆20Updated 7 years ago
- Explore Job Objects on a Windows system☆82Updated 6 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆27Updated 7 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆35Updated 3 years ago