dk0m

dk0m

Geek Repo

0

following

0

stars

Github PK Tool:Github PK Tool

dk0m's repositories

DSelfRunPe

Self Pe Injector Written In D.

Language:DLicense:MITStargazers:0Issues:0Issues:0

TamperingSyscallsD

Tampering System Calls Using Hardware Breakpoints For Evasion In D.

Language:DLicense:MITStargazers:3Issues:0Issues:0

DlangWhispers

Implementation Of SysWhispers Direct / Indirect System Call Technique In D.

Language:DLicense:MITStargazers:2Issues:0Issues:0

HwBpD

Utilizing Hardware Breakpoints For Hooking In D.

Language:DLicense:MITStargazers:1Issues:0Issues:0

GetSyscallStubD

Fetching Fresh System Call Stubs From NTDLL (Read From Disk) In D.

Language:DLicense:MITStargazers:3Issues:0Issues:0

Pie

A Light Pe Parser Written In Nim.

Language:NimLicense:MITStargazers:1Issues:0Issues:0

HawkLoader

An Indirect System Call Based Shellcode Loader Written Fully In D.

Language:DLicense:MITStargazers:3Issues:0Issues:0
Stargazers:0Issues:0Issues:0

SentinelsGate

Fetching System Call Service Numbers From The Control Flow Guard Function Table.

Language:C++License:MITStargazers:0Issues:0Issues:0

RdpVandalist

Exposing RDP Credentials Using Rc7Hook API Hooking.

Language:C++License:MITStargazers:1Issues:0Issues:0

Rc7Hook

A Patchless Windows API Hooking Library.

Language:C++License:MITStargazers:0Issues:0Issues:0

FindSsdt

Fun Little Code To Find The Address Of The Kernel SSDT From Usermode.

Language:C++License:MITStargazers:0Issues:0Issues:0

OffensiveD

Utilizing DLang For Offensive Operations.

Language:DLicense:MITStargazers:8Issues:0Issues:0

HadesGate

A New Method Of Retrieving System Call Service Numbers By Parsing NtOsKrnl Exports.

Language:C++License:MITStargazers:0Issues:0Issues:0

NeutralNim

Utilizing Nim For Both Offensive and Defensive Operations.

Language:NimLicense:MITStargazers:1Issues:0Issues:0