☆17Feb 29, 2020Updated 6 years ago
Alternatives and similar repositories for veeamon
Users that are interested in veeamon are comparing it to the libraries listed below
Sorting:
- Library for using direct system calls☆35Jan 30, 2025Updated last year
- Криптор с антиэмуляцией и полиморфизмом для x64☆17Jul 2, 2019Updated 6 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- Figuring out the cause of a handle downgrade☆24Dec 13, 2022Updated 3 years ago
- ☆17Aug 13, 2020Updated 5 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- init☆14Mar 16, 2020Updated 6 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆23Aug 7, 2016Updated 9 years ago
- ☆36Mar 11, 2019Updated 7 years ago
- ☆10Aug 16, 2019Updated 6 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆20Sep 12, 2019Updated 6 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- Magellan PoC☆34Jan 23, 2019Updated 7 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Mar 8, 2018Updated 8 years ago
- open source malware analysis and research notes dump☆26Aug 30, 2023Updated 2 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- it can extract functions from .dll, .exe, .sys and it be work! :)☆39Jun 11, 2019Updated 6 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆109Apr 24, 2020Updated 5 years ago
- MIR-Engine☆23Jul 6, 2017Updated 8 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- Microsoft Redistributable Download & Installer☆19Oct 14, 2019Updated 6 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆105May 14, 2020Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Mar 30, 2019Updated 6 years ago
- Fetch PDB symbols directly from Microsoft's symbol servers☆48Oct 22, 2025Updated 5 months ago
- NT reversal☆25Jul 12, 2018Updated 7 years ago
- Simple code to resolve library functions at runtime☆10Jan 5, 2015Updated 11 years ago
- Simple RAT (only on own network) made in C++☆19Mar 11, 2013Updated 13 years ago
- Undocumented NsiAllocateAndGetTable usage in GetTcpTableInternal reverse engineered on Win7 X64☆20Apr 7, 2018Updated 7 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Oct 16, 2019Updated 6 years ago
- Some interesting code☆18Jan 16, 2015Updated 11 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago