zodiacon / syllabiLinks
☆63Updated last year
Alternatives and similar repositories for syllabi
Users that are interested in syllabi are comparing it to the libraries listed below
Sorting:
- MalUnpack companion driver☆97Updated last year
- API Set Viewer☆90Updated 9 months ago
- Small visualizator for PE files☆70Updated 2 years ago
- Run Processes as PPL with ELAM☆172Updated 3 years ago
- Windows kernel PDB data parsed into YAML☆41Updated last week
- ☆25Updated last year
- A WinDbg extension to trace COM interactions☆122Updated 3 months ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆86Updated 5 years ago
- ☆26Updated 3 years ago
- Recon 2023 slides and code☆80Updated 2 years ago
- The Console Monitor Driver is a KMDF kernel-mode filter driver that captures certain Fast I/O operations (input and output) that is sent …☆41Updated 3 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆114Updated 4 years ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆112Updated 4 years ago
- API Logger for Windows Executables☆80Updated 5 years ago
- ☆72Updated 2 years ago
- Simple windows API logger☆109Updated 6 years ago
- CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆144Updated 5 years ago
- Sysmon shenanigans☆66Updated 5 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆36Updated 4 years ago
- Windows Drivers☆98Updated 6 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆35Updated 4 years ago
- ☆18Updated 4 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆118Updated 2 years ago
- Winbindex bot to pull in binaries for specific releases☆48Updated 2 years ago
- Set of antianalysis techniques found in malware☆131Updated 2 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆74Updated 3 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆62Updated last year
- Clone running process with ZwCreateProcess☆58Updated 5 years ago
- A set of small utilities, helpers for PIN tracers☆34Updated last month
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆36Updated 2 years ago