Orca
ZwProcessHollowing
Orca | ZwProcessHollowing | |
---|---|---|
7 | 1 | |
183 | 75 | |
- | - | |
0.0 | 1.8 | |
over 2 years ago | about 1 year ago | |
C++ | C++ | |
- | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Orca
ZwProcessHollowing
What are some alternatives?
al-khaser - Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
inline_syscall - Inline syscalls made easy for windows on clang
UBoat - HTTP Botnet
Black-Angel-Rootkit - Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.
adduser-dll - Simple DLL that add a user to the local Administrators group
syser - syser debugger x32/x64 ring3 with source level debugging/watch view/struct view
juicy-potato - A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
Corth - It's like Porth, but in C++. Yep, we're going full circle.
x64dbg - An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.