zodiacon / youtubecode
Youtube channel sample code
☆44Updated this week
Alternatives and similar repositories for youtubecode:
Users that are interested in youtubecode are comparing it to the libraries listed below
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated last year
- Demo from the Malware Analysis and Development Webinar☆20Updated 11 months ago
- SetWinEventHook Sample☆46Updated last year
- Remote Thread Detection with a Kernel Driver☆28Updated 2 months ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆39Updated 11 months ago
- Example of building an application verifer DLL☆45Updated 9 months ago
- ☆25Updated 2 years ago
- Native Powers Talk demos☆14Updated last year
- ☆37Updated last month
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆25Updated 9 months ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆30Updated 9 months ago
- Manually perform syscalls without going through any external API or DLL.☆18Updated last year
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆97Updated last year
- API Hammering with C++20☆45Updated 2 years ago
- Fork of Get-InjectedThread - https://gist.github.com/jaredcatkinson/23905d34537ce4b5b1818c3e6405c1d2☆36Updated last year
- Reimplementation of the KExecDD DSE bypass technique.☆46Updated 6 months ago
- ☆82Updated 6 months ago
- Code samples that serve as references for Windows API functions☆30Updated 9 months ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- Piece of code to detect and remove hooks in IAT☆63Updated 2 years ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆24Updated 8 months ago
- a stage1 DLL loader with sleep obfuscation☆35Updated 2 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆14Updated 8 months ago
- Next gen process injection technique☆45Updated 4 years ago
- List the ETW provider(s) in the registration table of a process.☆57Updated last year
- ☆112Updated 2 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆71Updated 3 years ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year